Why Taking the Right Security Measures Matters
- 1 of
-
More Vulnerabilities Than Ever
The Common Vulnerabilities and Exposures (CVE) system reported about 9,400 new vulnerabilities, with two-thirds of them involving networks. -
More Unique Attacks Than Ever
Of 1.7 trillion attacks made against intrusion prevention systems, 37 million of them were unique. That's a 100% increase from 2013. -
Most Common Exploits
The Nuclear, Angler and Magnitude exploit kits together form almost 90% of the "in the wild" exploit kits. The Angler exploit kit is the most prevalentaccounting for approximately 60% of all exploit kits. -
Number of Malware Attacks
Dell puts the number of malware attacks at 4.2 billion. Dell also reports 88 trillion hits for application traffic and 45 billion hits for post-infection malware activity. -
Point-of-Sale Systems Under Attack
Dell SonicWALL created 13 POS malware signatures in 2014, compared with just three signatures in 2013, a 333% increase in the number of new POS malware countermeasures developed and deployed. -
Embedded Systems Are Being Targeted
In 2014, Dell saw a twofold increase in SCADA (supervisory control and data acquisition) attacks, compared with 2013. Buffer-flow vulnerabilities continue to be the primary vehicle of attack. -
Impact of Heartbleed
The Heartbleed buffer over-read vulnerability, disclosed in April 2014, potentially affected about 17% (about 500,000) of the secure Web servers on the Internet. -
Zero-Day Vulnerabilities Discovered
Well-known zero-day vulnerabilities were released, with Shellshock vulnerabilities exploited by attackers within hours of the initial disclosure on Sept. 24, 2014. Within a week, millions of attacks and probes per day were observed. -
Encrypted Connections on the Rise
Dell saw a 109% increase in the volume of HTTPS Web connections from the start of 2014 to the start of 2015. Trouble is, hackers are starting to hide malware by embedding it in encrypted connections. -
-
What Partners Need to Know About HP, Inc.
View Slideshow » -
MSPs Face Big Cybersecurity Talent Gap
View Slideshow » -
Why Tech Companies Are Eager to Invest in 5G
View Slideshow » -
The Problem With Partner Referral Programs
View Slideshow » -
Microsoft Taps Channel for Digital Business
View Slideshow » -
New Technologies Will Fuel Channel Opportunities
View Slideshow » -
Channel's Transition to the Cloud Requires More Time
View Slideshow » -
Microsoft's Cloud Channel Begins to Mature
View Slideshow » -
Defining MSPs' Goals, Challenges and Tools
View Slideshow » -
Why Metrics Matter to the Channel
View Slideshow »
-
The latest Dell Security Annual Threat Report makes for disturbing reading because not only are the number of vulnerabilities and instances of malware on the rise, but also that malware is starting to be delivered via encrypted connections that IT security defenses can't pick up on. Most of the attacks rely on the same basic set of exploit kits, but the targets are changing. "Everyone knows the threats are real and the consequences are dire, so we can no longer blame lack of awareness for the attacks that succeed," said Patrick Sweeney, executive director, Dell Security. "Hacks and attacks continue to occur, not because companies aren't taking security measures, but because they aren't taking the right ones." The report confirms that digital hackers have identified point-of-sale (POS) and other types of systems as targets worth compromising. For solution providers across the channel, this means that the scope of the IT services they need to provide is expanding at a time when hackers are becoming more sophisticated in how they deliver malware payloads. That may not be what solution providers want to hear, but as the saying goes, to be forewarned is to be forearmed.
What Partners Need to Know About HP, ...
In the channel, HP, Inc. is a storied vendor that has relationships...Watch Now