Facebook Twitter Instagram YouTube LinkedIn
    Facebook Twitter Instagram LinkedIn YouTube
    Trending
    • Why is it Safer to Use a Prebuilt Platform for your Website?
    • Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity
    • 10 Strategies to Stop Ransomware Attacks
    • Rajiv Kulkarni Talks about the Malware Analysis Pipeline
    • IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’
    • Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases
    • BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles
    • Security Automation Cuts Down Expenses and Saves Time for IT Teams
    TechSpective
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    • Technology
      Featured
      March 1, 20216

      Could Home Study Be Better for Education? Using Technology to Craft a Better Tomorrow

      Recent
      May 27, 2022

      Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity

      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    • Reviews
      Featured
      March 4, 20211

      Dell’s UltraSharp 40 – Improving Work and Workplaces with Monitor Innovations

      Recent
      April 7, 2022

      Dell’s Latitude 5430 Rugged – Redefining the Extremes of Mobile Computing

      October 12, 2021

      Innovating Home Video Conferencing: Dell’s New 27 Video Conferencing Monitor – S2722DZ

      September 22, 2021

      Review: Intrusion Shield

    • Podcasts
    • Security
      Featured
      March 7, 20212

      Pandemic Unmasks Vulnerability to Automated Bot Attacks

      Recent
      May 26, 2022

      10 Strategies to Stop Ransomware Attacks

      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 23, 2022

      IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    • Microsoft
      Featured
      September 12, 20201

      The Microsoft Surface Duo: The Communications Device for Those That Think Different

      Recent
      April 8, 2022

      AI and Why Windows 12 Could Be a Far Bigger Advance than Windows 95 Was

      October 11, 2021

      The Surface Laptop Studio: Building a Windows 11 Targeted Laptop

      August 28, 2021

      Why Microsoft’s Hardware Baseline for Windows 11 Is Important

    • News & Analysis
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 25, 2022

      Rajiv Kulkarni Talks about the Malware Analysis Pipeline

      May 20, 2022

      BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

      May 20, 2022

      IBM Think 2022 – Embracing the Present, Preparing for the Future

    • Business
      Featured
      March 6, 20212

      Fixing The World One Person At A Time: Cisco Networking Academy

      Recent
      May 27, 2022

      Why is it Safer to Use a Prebuilt Platform for your Website?

      May 20, 2022

      Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

      May 20, 2022

      Security Automation Cuts Down Expenses and Saves Time for IT Teams

    TechSpective
    You are at:Home»Security»Cyber Espionage»How collective intelligence can protect your business from sophisticated attacks
    Webroot Threat Report
    Image from Pixabay

    How collective intelligence can protect your business from sophisticated attacks

    0
    By Rahul Dasgupta on June 9, 2015 Cyber Espionage, Data Breach, Data Protection, Security Awareness, Threat Intelligence

    Last week hackers stole the personal information of 4 million federal workers after the Office of Personnel Management and Interior Department were compromised. Another case of hacking was reported this week and this time the victim is the U. S. Army, which had to take down its website following this attack.

    However, this isn’t just happening to the government as a large number of corporate entities have been attacked as well, such as the famous Sony and Anthem hack.

    Almost every organization has a sound security infrastructure these days because of the ever-increasing threat of cyber-attacks. However, a large number of them are still vulnerable to today’s sophisticated attacks so the question is, “How can enterprises protect themselves against this dynamic threat landscape?”

    A recent report by Webroot, a market leader in smarter security and collective intelligence, reveals current threat statistics, the reason behind today’s attacks, and how you can make your business foolproof against these threats. Let’s take a look at them.

    Why Organizations are Still Vulnerable

    According to Hal Lonas, CTO of Webroot, there are four reasons why organizations are still vulnerable:

    • Outdated security practices (the most common reason).
    • Lack of understanding and intelligence about today’s dynamic threat opportunities
    • Inability to block previously unseen attacks
    • Unavailability of tools to cut down time-to-detection for the breaches that have gone unnoticed
    Webroot

    Key Findings

    Here is a quick rundown of several key findings revealed in the report:

    • 85,000 new malicious IPs are launched every day, and financial and technology companies remain top favorites as phishing targets
    • Half of total malicious IP addresses are based in Asia. The U.S. accounts for 31% of malicious IP addresses, followed by China with 23%, Russia with 10%, and South Korea with 8%
    • Spam sources hold the majority of all malicious IPs by threat type – approximately 90%
    • 30% of internet users access phishing sites
    • There is a 30% chance of internet users failing for a zero day phishing attack in the course of a year
    • Only 28% of mobile apps on the Android Play Store were trustworthy or benign on an average
    • The U.S. is the largest host of phishing sites

    How Can Organizations Make Their Security Foolproof

    It is essential for users and IT departments to have access to up-to-date intelligence on threats to their systems.

    Today, we encounter much more advanced and smarter threats so it is important that your security controls adapt accordingly. That includes being aware of the categories of apps that are most likely to be malicious, the types of websites that are most often imitated in phishing attacks, and the latest malicious IPs.

    According to Hal Lonas, an inevitable solution to combat both new and known threats is by implementing real-time, contextual, and predictive threat intelligence as a critical component in your defense-in-depth strategy.

    Additionally, you should be more cautious about the websites you and your employees visit, the URLs accessed from emails, and the applications being used.

    So how advanced is your security infrastructure? Are you ready to take advantage of collective threat intelligence to make your enterprise security foolproof? Please share your opinions in the comments below.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleProtecting yourself after a massive data breach
    Next Article Protecting businesses from the top cybersecurity concerns
    Rahul Dasgupta

    Related Posts

    10 Strategies to Stop Ransomware Attacks

    IDS Alliance Raises Awareness of IAM Fundamentals with the ‘CISO Chronicles’

    Cybersecurity Myths that are Compromising Your Data and How to Address Them

    Comments are closed.

    Site Sponsors
    Intel
    DevOps.com
    Adobe
    PopSpective
    • Technology
    • Popular
    • Top Reviews
    May 27, 2022

    Overcoming Barriers to the Metaverse Requires Ubiquitous Connectivity

    May 20, 2022

    Building Digital Accessibility: AI Requires Human Oversight to Cut Down on Algorithmic Biases

    May 20, 2022

    BlackBerry Ivy: Enabling a New Age of Electric Secure Autonomous Vehicles

    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    9.7
    November 16, 2018

    Review: BlackVue DR900S-2CH Vehicle Dash Cam

    9.5
    September 2, 2015

    Review: Microsoft Band

    May 27, 2014

    Protect your family photos with ScanMyPhotos

    PopSpective
    Popular Posts
    9.0
    July 14, 2016

    Review: Lenovo Yoga 900S

    9.5
    March 2, 2015

    Review: Asus Zenbook UX305 ultrabook

    8.0
    February 9, 2015

    Review: Burg 12 smartwatch

    Adobe
    Coffee and Politics
    PopSpective
    Coffee and Politics
    • RSS
    • Facebook
    • Twitter
    • Google+
    • LinkedIn
    • Instagram
    • Pinterest
    About

    TechSpective covers technology trends and breaking news in a meaningful way that brings value to the story, and provides you with information that is relevant to you. We offer in-depth reporting and long-form feature stories, as well as breaking news coverage, product reviews, and community content in plain English terms, and with a unique perspective on technology.

    PopSpective

    © 2020 Xpective, Inc.

    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact
    © 2021 Xpective, Inc.
    • About
    • Privacy
    • Advertise
    • Subscribe
    • Contact

    Type above and press Enter to search. Press Esc to cancel.