Two out of three companies infected with hazardous computer bots

26th April 2013

  

Font size: - +

A study by security company Check Point of 900 companies in Europe, the Middle East, the Americas and Asia Pacific, including 35 companies in South Africa, found that 63% of the companies were infected with hazardous bots.

“Many of the most serious threats remained hidden from network administrators. These threats come from ever-changing techniques deployed by criminal hackers, in addition to risky online activities by employees, which unintentionally create vulnerabilities on the corporate network. To develop a strong security blueprint, organisations must, firstly, be aware of and fully understand the activities occurring on their networks,” Check Point states.

The research showed that more than half of the companies were infected with new malware at least once a day. Significant cyber threats include botnets, malware, vendor vulnerabilities and exposures, as well as structured query language injection events.

Further, 91% of organisations used Web applications that had potential security risks. The surge in business Web applications has given criminal hackers unprecedented options to penetrate corporate networks. These risky Web applications include the frequency and use of anonymisers (enabling users to surf the Internet anony-mously), peer-to-peer applications, file-storage and sharing applications, as well as popular social networks – all of which can potentially open a backdoor to enterprise networks.

“More than half of the organisations studied had at least one potential data-loss incident. Corporate information is more accessible and transferable today than ever before, leading to higher risks of data loss or leakage. The study shows that different types of sensitive data were leaked and lost; including pay- ment card industry-related information and protected health information,” Check Point adds.

“The findings confirm that data security and threat prevention need to be included among the top security priorities for business leaders in South Africa. A key recommendation from these findings is adopting a security vision, which redefines security as a three-dimensional business process that combines policies, people and enforcement for stronger protection across all layers of security, including network, data and endpoints,” says Check Point South Africa sales manager Doros Hadjizenonos.

Our research uncovered many alarming vulnerabilities and security threats on networks, of which most organisations were not aware.

Edited by Martin Zhuwakinyu
Creamer Media Senior Deputy Editor

Comments

The content you are trying to access is only available to subscribers.

If you are already a subscriber, you can Login Here.

If you are not a subscriber, you can subscribe now, by selecting one of the below options.

For more information or assistance, please contact us at subscriptions@creamermedia.co.za.

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION