CHECK POINT’S 2013 SECURITY REPORT UNCOVERS HIDDEN SECURITY RISKS ON ENTERPRISE NETWORKS

Defines Priorities for Organizations Worldwide
CALGARY, AB – February 22,  2013Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, has issued its 2013 Security Report, uncovering major security risks that impact organizations worldwide.
The New Report examines top security threats, risky web applications that compromise network security, and loss of data caused by employees unintentionally. Most importantly, the Report provides security recommendations on how to protect against these threats.
For a complete copy of the Check Point 2013 Security Report visit: www.checkpoint.com/campaigns/security-report/index.html
A Check Point spokesperson is available to discuss this Report.
As the arms race between attackers and IT professionals unfolded in 2012, it has become clear that many of the most serious threats stayed hidden from network administrators. These threats come from ever-changing techniques deployed by criminal hackers in addition to risky online activities by employees, which unintentionally create vulnerabilities on the corporate network. In order to develop a strong security blueprint, organizations must first be aware of and fully understand the activities occurring on their networks.
Based on research of nearly 900 companies, the Check Point 2013 Security Report sheds light on what is hiding on corporate networks, and the major security risks organizations are exposed to on a daily basis:
Hidden Security Threats 
From crimeware to hacktivism, cyber attacks will continue to evolve this year, impacting organizations of all sizes. The research revealed that 63 per cent of organizations were infected with bots, and more than half were infected with new malware at least once a day. The report reveals a list of top threats, including the most infamous botnets, top malware location by country, top vendor vulnerabilities and exposures, and SQL injection events by source country, among other surprising findings.

Risky Web 2.0 Applications
The surge in web 2.0 applications has given criminal hackers unprecedented options to penetrate corporate networks. The research found 91 per cent of organizations used applications with potential security risks. These risky web applications are brought to light in the report, including frequency and usage of anonymizers, P2P applications, file storage and sharing applications, and top social networks – all of which can potentially open a backdoor to enterprise networks.
Data Loss Incidents 
Corporate information is more accessible and transferable today than ever before, leading to higher risk of data loss or leakage. More than half of the organizations studied had at least one potential data loss incident. The report exposes the different types of sensitive data leaked and lost, including PCI related information as well as HIPAA–protected health information. It also sheds light on the industries with the highest tendency toward data loss.
“Our research uncovered many alarming vulnerabilities and security threats on networks that most organizations were not aware of,” said Paul Comessotti, Canadian Regional Director, Check Point Software Technologies. “With clearer visibility, IT professionals can now better define a security blueprint to protect their organizations from the constant stream of evolving security threats, ranging from botnets, to employees using risky web applications like anonymizers, to data loss.”
“Check Point’s 2013 Security Report is a resounding call-to-action, providing unique insight into the magnitude and breadth of the current and emerging threat landscape,” said Alberto Dosal, chairman of the board of Compuquip Technologies, one of South Florida’s largest, fully integrated IT service providers.  “It is truly an impressive and comprehensive must-read for any C-level executive.”
As a trusted security leader, Check Point helps organizations of all sizes implement a security blueprint and architecture that aligns with business needs.
The company’s award winning portfolio of products provides organizations with multi-layered security to combat all types of threats identified in the report. Check Point Security Gateways running Check Point Software Blades, such as IPS, Application Control, URL Filtering, Antivirus and Anti-Bot, can detect and prevent the latest threats. Check Point ThreatCloud™ feeds software blades with real-time intelligence and signatures. Additionally, Check Point Secure Web Gateway blocks access to malware infested websites and usage of high risk applications like anonymizers. And Check Point DLP Software Blade helps organizations
pre-emptively protect sensitive information from unintentional loss and leakage.
To read the full report, click:
http://www.checkpoint.com/campaigns/security-report/index.html
For more information on conducting an onsite security analysis of your infrastructure, click here: http://www.checkpoint.com/campaigns/3d-analysis-tool/index.html
About the Report
The Check Point 2013 Security Report provides insight into network security events that occurred in organizations worldwide and recommendations on how to protect against them. The report is based on research and analysis of nearly 900 companies gathered from Check Point 3D security reports, Check Point ThreatCloud™, and Check Point network of sensors.

Leave a Reply