The rapid growth of malware - the Check Point report
In the last four years, the number of malware has increased by a factor of eight. The average loss of small enterprises in connection with this type of attacks is already 92 thousand. dollars. Meanwhile, hackers are trying to bypass our firewalls using relatively simple tricks.
By the name of malware, we define programs whose purpose is to disrupt the work of the komupter, to obtain confidential data or to gain access to the IT system of the selected company. Malware can spread through infected websites, programs and external devices.
For 5 years, the number of malware has been growing in the world at a dizzying pace - according to Check Point Security Report data in 2010 and 2011 there were 18 million attacks, in 2012 this number increased to 34 million, and in 2014 to 142 million! With the increase in the number of attacks, the costs of protecting companies against this type of cybercrime are rising. The medium-sized network security for the Polish enterprise will amount to PLN 1.5 million this year - analysts from Check Point Software Technologies predict. However, this is not enough, given the fact that in Poland, companies rarely realize the scale of losses incurred in connection with a security incident. Experts estimate that this year the loss resulting from a single attack will amount significantly above PLN 500,000.
On average, every hour companies download 106 unknown malware files, 48 times more than in 2013! In most cases, these were earlier known types of malware that only contained changes to several lines of code. However, these simple changes often allow hackers to bypass even the most current anti-viruses.
According to Thierry Karsenti, Technical Director of Check Point, to avoid the above hacking tricks, additional protection in the form of emulation or sandboxing should be applied. These technologies capture suspicious files as soon as they cross the company's network gateway and then control them in the so-called virtual environment in terms of unusual behavior in real time. If the file is found to be harmful, it will be moved directly to quarantine, protecting the entire network from being infected.
source: Check Point
Learn more about our offer
We use Google Cloud Translation and Gengo API’s to translate articles with exception of our comparative tests.