
Cybersecurity threats on the rise – Symantec releases annual internet security threat report
Here’s what you need to know!
According to Symantec’s 2017 Annual Internet Security Threat Report:
- Malware-laden email increased significantly, from 1 in 220 emails in 2015, to 1 in 131 emails in 2016 – the highest rate in five years. With the exception of retail, every industry saw an increase in email malware in 2016; small to medium-sized businesses (1 to 500 employees) were the most affected.
- Average ransom demands in 2016 rose to $1,077, up from $294 in 2015.
- There was a two-fold increase in attempted attacks against IoT devices (webcams, wifi thermostats, etc.) in 2016, and, at times of peak activity, the average IoT device was attacked once every two minutes.
- The average organization was using 928 cloud apps in 2016, up from 841 in 2015. However, most CIOs think their organizations only use around 30 or 40 cloud apps.
- 357M new malware variants were discovered in 2016, up slightly from 355M in 2015.
- 76% of scanned websites had outstanding vulnerabilities.
- 3,986 zero-day exploits were identified in 2016.
- Fileless/”living off the land” tactics—the use of legitimate tools for malicious activity—poses a significant threat to all businesses. Additionally, Symantec’s analysis in late 2016 showed that 95.4% of inspected PowerShell scripts were malicious.
- Symantec blocked an averaged of 229,000 unique web attacks per day in 2016.
- On average, 2.4 browser vulnerabilities discovered per day in 2016.
- In 2016, there were 15 mega breaches (more than 10 million identities were stolen), an increase from 11 in 2014 and 13 in 2015 – 90% of identities stolen in the US were exposed in just eight mega-breaches.
Full report can be downloaded here: ISTR22_Main-FINAL-APR24
Phishing and Ransomware have become part of a billion-dollar industry. If not handled correctly, protecting your business from attackers/hackers will not only become a full-time job, but it will be a losing battle that could end up costing your business (and potentially your customers) thousands of dollars or more. We can ease this burden by conducting a comprehensive security audit and ensuring compliance with relevant industry standards and best practices as well as with any applicable federal and state laws.
We will:
- Examine your current network design, hardware and software to identify potential vulnerabilities and make any recommendations.
- Develop, revise and/or update maintenance, security and disaster recovery policies
- Provide end-user training