
|
Features
|
Everything connected - and safe
The Internet of Everything brings together people, process, data and 'things' in a powerful new way. But it also brings a great deal of risk |
 |
The solace of quantum
Quantum Key Distribution technology - the next frontier of data encryption technology - signals a brave new future |
 |

Opinions |

Product Reviews |
|
Libra ESVA 3.5
Libra scores over the big names in the anti-spam market with its ESVA (email security virtual appliance)
|
 |
Gemalto SafeNet ProtectV 2.0
The cost benefits alone make moving virtualised data centres into the cloud a no-brainer, but concerns about security are still a major stumbling block
|
 |

White papers |
|
COMPUTING SECURITY AWARDS |
|
COMPUTING SECURITY AWARDS
As we start to look forward to the awards for 2015, an event that is already shaping up to be a very hard-fought contest, here are some more winners from 2014:
|
|
|
|
Welcome to the June 2015 Newsletter.
Here's a sobering point to reflect on. Check Point has monitored and analysed hundreds of millions of security events from over 17,000 organisations worldwide across a range of industry sectors, using in-depth security audits and its own global network of threat sensors, and the results are not heartening.
Its 2015 Security Report shows the following outcomes on an average day in an average enterprise business:
• Every 34 seconds, unknown malware is downloaded to company networks (48x more than 2014's report)
• Every 60 seconds, a bot infection on a network communicates with its command centre (3x more than for 2014)
• Every 6 minutes, a known malware type is downloaded to company networks (nearly twice as much)
• Every 30 minutes, a DDoS attack is launched against an organisation (6x more)
• Every 36 minutes sensitive data are sent outside the organisation (37% more).
Just as concerning was Symantec's latest Internet Security Threat Report (ISTR), Volume 20, which exposed a tactical shift by cyberattackers: they are now infiltrating networks and evading detection by hijacking the infrastructure of major corporations and using it against them.
"Attackers don't need to break down the door to a company’s network when the keys are readily available," says Kevin Haley, director, Symantec Security Response. "We're seeing attackers trick companies into infecting themselves by Trojanising software updates to common programs and patiently waiting for their targets to download them-giving attackers unfettered access to the corporate network."
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|