Malicious Mobile Apps (MMA) — A Growing Threat in 2013 and Beyond With the exploding use of mobile devices and BYOD, mobile apps represent a major new threat. This infographic reveals some surprising facts about malicious mobile apps, including where they come from, what they do, and what other IT pros are thinking about MMAs.
Below are some key highlights:
73% of IT pros expect mobile threats to their networks will increase in the next 12 months
Web Threats Expose Businesses to Data Loss Webroot commissioned a study to gauge the prevalence of web-borne attacks, their consequences, and how IT pros are responding. Among the results, the vast majority of companies surveyed experienced one or more types of web-borne attacks in 2012.
The survey report also includes recommendations—such as deploying a secure web gateway—for responding to this new threat environment.
Key findings include:
8 in10 companies experienced web-borne attacks in 2012
The majority of respondents reported significant impacts such as increased help desk time, reduced employee productivity and disruption of business activities
Secure web gateways are a critical component of an effective defense against web-borne threats
The Wild, Wild West of Mobile Apps This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate
security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild:
Key findings include:
Collects millions of applications from a variety of sources
Stores mobile app data in the world’s largest cloud-based threat database
Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworthy
Web Threats — Is Your Company Exposed? This infographic gives a quick visual representation of some of the key findings of recent Webroot research on web security in the US and UK. The findings highlight the significant costs that web threats pose to businesses—such as increased help
desk support—and the risks especially for companies with no web security installed. It also offers some quick recommendations for protecting against these threats. Among the major points:
Below are some key highlights:
Phishing is the most prevalent web-borne cyber attack
8 in 10 companies experienced one or more types of web-borne attacks in 2012
71% of companies say web-borne threats increased help desk time
Reinventing Antivirus This white paper describes how new threats have stretched the capabilities of “fat client” security architectures to the limit, making
it impractical to keep endpoints updated with signatures for all the new viruses. It discusses how a revolutionary approach is making traditional antivirus obsolete by replacing bloated clients and large signature downloads with:
Journaling and rollback
Behavioral recognition of malware
These improve performance and effectively address the new threat environment, which includes protecting against zero day threats.
Mobile Browsing — Is Your Company at Risk? This infographic gives a quick visual representation of some of the key findings of a recent Webroot research on web security in the US and UK. As cybercriminals increasingly exploit vulnerabilities in mobile browsers and apps, companies with mobile workforces face new challenges in protecting users and critical data.
And the impacts of failing to protect against mobile browsing threats can be severe. The infographic also gives a checklist of things you can do to reduce the risks.
Among the key points:
50% of companies in the US estimate that web-borne attacks cost from $25,000 to $1 million in 2012.
90% of respondents agree that managing the security of remote users is challenging
50% of firms with remote workers had a website compromised
Remote Users Expose Companies to Cybercrime Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities.
The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones.
90% of companies agree that managing the security of remote users is extremely challenging
Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data
50% of firms with remote users say web-borne attacks impacted company financials
These phish evade traditional antivirus and antiphishing products. Using targeted information — often gathered from social media sites — they fool even security-savvy employees into divulging sensitive information or visiting websites that infect machines with dangerous malware.
Learn more about:
Uncovering phishing emails and phishing websites in real time
Limiting the amount of personal information employees expose on social media sites
Leveraging the world’s largest cloud-based threat network
Putting Web Threat Protection and Content Filtering in the Cloud This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based
secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as:
Better defense against zero-day threats and spam servers
More comprehensive signature and URL database
Supports remote users more securely and without the cost of putting servers in every location
From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with:
100% protection against known viruses
Industry-leading URL filtering and IP protection via the world’s largest threat database
PassMark Ranks Leading Endpoint Protection Products In today's challenging security environment, using the best products that fulfill your business needs is of the essence. So when evaluating solutions, be sure to look at all aspects of a product—including performance benchmark testing.
PassMark Software is a leading authority in software and hardware performance benchmarking, providing independent testing and analysis. In this recent PassMark report, discover how eight different endpoint security software products compare on a variety of metrics—from performance to malware protection—to help you determine which would work best in your organization.
Faster Scans and Better Virus Detection—Can They Do That? This FAQ tells you how to move beyond the old trade-off between anti-malware effectiveness and speed. It answers questions such as what is wrong with conventional approaches, which includes the inability of clients to perform signature matching operations on today's more than 70 million malware variants.
It also discusses how the cloud and behavioral detection overcome the limitations of signature-based approaches. Finally, it answers questions about how cloud solutions can offer specific benefits such as:
Improving speed by offloading pattern matching from endpoints
System Analyzer Webroot® System Analyzer looks inside a problem system and gives you a quick assessment plus a detailed report on all aspects of hardware, OS and installed applications—in less than 2 minutes. You can run this free tool at any time to assess the health and security status of the PCs in your environment.