Checkpoint – 2018 Security Report

Mejor Tecnología, Mejores Resultados

Checkpoint – 2018 Security Report

Sharing is caring!

 

Checkpoint

Security Report 2018

2017 was a pivotal year that surprised many in the IT security industry. From the resurgence of destructive ransomware, IoT botnets, data breaches and mobile malware to sophisticated multi-vector technologies, it is clear we are witnessing an inflection point and a transition to the fifth generation of cyber attacks.

As the cyber landscape evolves, the World Economic Forum recently placed cyber attacks as one of the top three global risks for 2018. Indeed, we are now seeing threat actors effectively weaponizing ransomware as a
way to cripple large institutions, affecting the health and lives of nation-states’ populations, as well as causing pain to many businesses’ bottom lines.

Data breaches took center stage in the past year, with some shocking revelations about major customer data compromises. Furthermore, the size and frequency of such attacks, from Uber to Equifax, shows no sign of slowing.

Security gaps in mobile features such as Bluetooth, as well as mobile app stores, have also meant that many malware variants continue to roam freely. In fact, millions of mobile devices worldwide have been infected by
malicious apps generating high revenues for those who manage to infiltrate such app stores.

In addition, the increasing popularity and meteoric rise in value of crypto-currencies took the world by storm and led to a significant increase in the distribution of cryptominers, which quickly became a favorite monetizing
attack vector.

And finally, the leak of alleged CIA cyber tools by hacktivist groups was seen to cast a long shadow over the global information security ecosystem as a whole. From alleged election hacking to critical infrastructure sabotage, more evidence came to light of nation-state-backed technologies being behind some of the largest global cyber attacks.

In this report, we will take a look back over the past year and try to make sense of it. In turn we will realize how the threat landscape, by entering the fifth generation of cyber security, now spans across countries and
industries along multiple vectors of network, cloud and mobile and uses state-sponsored technologies to do so. By reviewing recent attacks we can understand, however, how 97% of organizations are not prepared for the fifth generation of cyber attacks. We will then be able to take a closer look at what 2018 may have in store and, most importantly, how best to prepare for it.

Descarga el informe completo, llenando los datos 



TeléfonoEmail

Reporte de seguridad Checkpoint

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *