Video: 3 cyber threats you probably aren’t aware of
We’re all aware of the more common ways hackers can infiltrate your business. But as technology advances, the bad guys are getting even more creative about stealing your data. Here’s what they’re up to…and how you can prevent it.
2020 Webroot Threat Report: Phishing Attempts Grew by 640% Last Year
The annual Webroot Threat report was recently released, highlighting not only the agility and innovation of cybercriminals who continue to seek out new ways to evade defenses, but also their commitment to long-established attack methods. Most notably, Webroot observed a 640 percent increase in phishing attempts and a 125 percent increase in malware targeting Windows 7. The report is derived from metrics captured and analyzed by Webroot’s advanced, cloud-based machine learning architecture: the Webroot Platform.
“In the cybersecurity industry the only certainty is that there is no certainty, and there is no single silver bullet solution,” said Hal Lonas, Senior Vice President and CTO, SMB and Consumer, OpenText. “The findings from this year’s report underline why it’s critical that businesses and users of all sizes, ensure they’re not only protecting their data but also preparing for future attacks by taking simple steps toward cyber resilience through a defense-in-depth approach that addresses user behavior and the best protection for network and endpoints.”
Here are a few of the findings that I found pretty interesting:
Phishing URLs encountered grew by 640 percent in 2019.
1 in 4 malicious URLs is hosted on an otherwise non-malicious domain.
8.9 million URLs were found hosting a cryptojacking script.
The top sites impersonated by phishing sites or cybercriminals are Facebook, Microsoft, Apple, Google, PayPal and DropBox.
The top five kinds of websites impersonated by phishing sites are crypto exchanges (55%), gaming (50%), web email (40%), financial institutions (40%) and payment services (32%).
Malware targeting Windows 7® increased by 125 percent.
93.6 percent of malware seen was unique to a single PC – the highest rate ever observed.
85 percent of threats hide in one of four locations: %temp%, %appdata%, %cache%, and %windir%, with more than half of threats (54.4%) on business PCs hiding in %temp% folders. This risk can be easily mitigated by setting a Windows policy to disallow programs from running from the temp directory.
IP addresses associated with Windows exploits grew by 360 percent, with the majority of exploits targeting out-of-date operating systems.
Consumer PCs remain nearly twice as likely to get infected as business PCs.
The data reveals that regions most likely to be infected also have the highest rates of using older operating systems.
Of the infected consumer devices, more than 35 percent were infected more than three times, and nearly 10 percent encountered six or more infections.
The continued insecurity of consumer PCs underscore the risk companies face in allowing employees to connect to business networks from their personal devices.
Trojans and malware accounted for 91.8 percent of Android™ threats.
PC Madness provides a Cloud base Protection to better protect our Clients. PC Madness offers a managed service to their clients, helping in detecting and removal of threats without putting the client in stress. See below video and information on how PC Madness and Webroot Endpoint can help you today.
Discover cloud-based protection that stops threats in real time and secures businesses and individuals wherever they connect.
What is endpoint protection?
Endpoint protection, or endpoint security, is a general term that describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include antivirus and antimalware, web filtering, and more.
Endpoint protection helps businesses keep critical systems, intellectual property, customer data, employees, and guests safe from ransomware, phishing, malware, and other cyberattacks.
Why businesses need endpoint protection
Criminals are constantly developing new ways to attack networks, take advantage of employee trust, and steal data. Smaller businesses may think they’re not a target, but that couldn’t be further from the truth. In fact, small businesses with 100 employees or fewer now face the same risk of attack as a 20,000-employee enterprise.*
No matter their size, businesses need reliable endpoint security that can stop modern attacks. And since most companies are subject to some form of compliance and privacy regulations, protection for endpoints is 100% necessary to help businesses avoid hefty fines and damage to their reputation due to a security breach.
Why Webroot Business Endpoint Protection is Different
We designed our solutions to put time back in your day, so you can maximize profitability.
Stop sophisticated cyberattacks
Contextual threat intelligence
Fast deployment & scans
RMM, PSA & BI integrations
Save time and money
Lower TCO & flexible billing
No software conflicts
Content taken from Webroot.com
PC Madness Provides a whole range of IT technology services to it’s clients