Why Taking the Right Security Measures Matters

Security measures

1 - More Vulnerabilities Than EverMore Vulnerabilities Than Ever

The Common Vulnerabilities and Exposures (CVE) system reported about 9,400 new vulnerabilities, with two-thirds of them involving networks.

2 - More Unique Attacks Than EverMore Unique Attacks Than Ever

Of 1.7 trillion attacks made against intrusion prevention systems, 37 million of them were unique. That’s a 100% increase from 2013.

3 - Most Common ExploitsMost Common Exploits

The Nuclear, Angler and Magnitude exploit kits together form almost 90% of the “in the wild” exploit kits. The Angler exploit kit is the most prevalent—accounting for approximately 60% of all exploit kits.

4 - Number of Malware AttacksNumber of Malware Attacks

Dell puts the number of malware attacks at 4.2 billion. Dell also reports 88 trillion hits for application traffic and 45 billion hits for post-infection malware activity.

5 - Point-of-Sale Systems Under AttackPoint-of-Sale Systems Under Attack

Dell SonicWALL created 13 POS malware signatures in 2014, compared with just three signatures in 2013, a 333% increase in the number of new POS malware countermeasures developed and deployed.

6 - Embedded Systems Are Being TargetedEmbedded Systems Are Being Targeted

In 2014, Dell saw a twofold increase in SCADA (supervisory control and data acquisition) attacks, compared with 2013. Buffer-flow vulnerabilities continue to be the primary vehicle of attack.

7 - Impact of HeartbleedImpact of Heartbleed

The Heartbleed buffer over-read vulnerability, disclosed in April 2014, potentially affected about 17% (about 500,000) of the secure Web servers on the Internet.

8 - Zero-Day Vulnerabilities DiscoveredZero-Day Vulnerabilities Discovered

Well-known zero-day vulnerabilities were released, with Shellshock vulnerabilities exploited by attackers within hours of the initial disclosure on Sept. 24, 2014. Within a week, millions of attacks and probes per day were observed.

9 - Encrypted Connections on the RiseEncrypted Connections on the Rise

Dell saw a 109% increase in the volume of HTTPS Web connections from the start of 2014 to the start of 2015. Trouble is, hackers are starting to hide malware by embedding it in encrypted connections.

Michael Vizard
Michael Vizard
Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight, Channel Insider and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.


Must Read