Different form of malware is downloaded in every 81 seconds – a recent study has revealed. It has been seen that the researchers analyzed the gateway activities, revealing details on how enterprises are facing attack trends of known and unknown malware and the impact of mobile devices in the enterprise. In addition, the impact of successful breaches was measured along with the added expenses that go beyond assessments.
In the recent study of malware threats, it has been seen that more than 300 IT security professionals across the globe uncover the threats that organizations encounter frequently. When and how these types of threats create big impact is the matter of research and the greatest challenges are to resolve. The study revealed that some unknown malware continues their evolutionary growth. It has been seen that there is an increase in the number of unknown malware crippling businesses. As a whole, there are nearly 12 million new malware variants discovered every month, with more new malware discovered in the past two years.
The usage of smartphones and tablets has risen to 60% in digital world. On few occasions, the employees unintentionally cause network breach to the company with 1-in-5 cases happening through mobile malware. Endpoints are considered to be the root cause of most threats. As per the businesses surveyed, endpoints are the most common cause (almost 75%) of breaches and the most crucial component in cyber defenses. In addition, 39% of endpoint attacks bypassed the network gateway firewalls and routine operations uncovered 85% of threats already intruded inside the enterprises.
Due to the rise of BYOD, the organizations agree to the point that it is impossible to stop employees from connecting their personal devices to corporate resources. It is true that ‘Bring Your Own Device’ (BYOD) increases productivity effectively. Unfortunately, mobile platform is the prospective target for attackers as most of the organizations are yet to provide security to the devices brought in the premises.
The three biggest attack vectors of a smartphone are – infected apps, network attacks and exploitation of Operating System. After getting access, an attacker generally looks for login credential details and exploits other technologies like phone’s camera or installed apps. It is always recommended to educate their employees, make them understand the risk associated with devices brought from outside, enforce security hygiene for them and separate the work data from the list of personal data gathered.
eScan, now debuts a Proactive Behavioral Analysis Engine (PBAE) that monitors the activity of all the processes on the Local Machine and whenever PBAE encounters an activity or behavior, which is reminiscent of a Ransomware, a red flag is raised and the process is rendered inactive from conducting any further damage. However, Ransomware can also encrypt files residing on the network share. In such cases, when an infected system is accessing the Network Share of a protected system and tries to modify the files residing over there, PBAE, invalidates the network session immediately. Thus, updating the antivirus software regularly and staying alert about e-mails from unknown sources can protect the system and files/folders from Malware attacks.