SHARE
Facebook X Pinterest WhatsApp

Distinguishing ‘True’ Malicious Security Threats

Security threats Distinguishing ‘True’ Malicious Security Threats One of the biggest challenges companies face with thousands of suspicious or unusual activities per month is determining which ones pose the biggest threats. Suspicious Activities These activities fall into three areas: abnormal behavior, log-in activity (such as log-in challenges, log-in failures and log-in circumvention) and admin actions […]

Written By
thumbnail Gina Roos
Gina Roos
May 17, 2016
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Security threats

1 - Distinguishing 'True' Malicious Security ThreatsDistinguishing ‘True’ Malicious Security Threats

One of the biggest challenges companies face with thousands of suspicious or unusual activities per month is determining which ones pose the biggest threats.

2 - Suspicious ActivitiesSuspicious Activities

These activities fall into three areas: abnormal behavior, log-in activity (such as log-in challenges, log-in failures and log-in circumvention) and admin actions that can affect domain-wide app installs, security setting changes and granting of admin privileges.

3 - Tracking ActivitiesTracking Activities

An organization experiences 5,732 suspicious activities monthly, on average.

4 - Suspicious ActionsSuspicious Actions

Of the 5,732 monthly suspicious behaviors, 58% are abnormal behaviors, 31% are related to log-in activity and 11% are admin actions.

5 - Brute ForceBrute Force

8% of all user log-ins fail or get challenged. Of these, 1.3% originate from risky countries.

6 - Cloud RisksCloud Risks

Top offenders download 227 times more documents from corporate clouds than average users.

7 - High-Risk BehaviorHigh-Risk Behavior

Top offenders also trash 141 times more docs than the average user in a month, and fail to log in 113 times more often.

8 - Log-in AttemptsLog-in Attempts

While 99.6% of users typically log in to corporate cloud platforms from one or two countries
per week, 1 in 20,000 users logs in from six or more countries. Some users log in from as many as 68 countries in a week.

9 - Suspicious and Abnormal Log-insSuspicious and Abnormal Log-ins

While 1 in 5,000 (0.02%) user activities is suspicious, there are 1,286 monthly instances of abnormal log-ins across distances in suspiciously short timeframes per organization.

10 - Risky IP AddressesRisky IP Addresses

2,062 monthly instances of activity from unapproved IP addresses occurs per organization.

Recommended for you...

Sherweb Expanding Portfolio Offerings With Expert Guidance
Jordan Smith
Aug 15, 2025
Arctic Wolf Research: Cyber Insurance Driving Security Needs
Victoria Durgin
Aug 14, 2025
Brivo Launching New Solution to Boost Security Suite
Jordan Smith
Aug 13, 2025
MetTel to Modernize Communication Lines for VA
Jordan Smith
Aug 8, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.