Kaspersky Lab has presented the results of a study conducted by its Global Emergency Response Team on various security policy mistakes made by many companies.
Kaspersky Lab has presented the results of a study conducted by its Global Emergency Response Team ‚ a consulting service for the company’s corporate users. The data that was accumulated while serving corporate customers highlights the main IT security policy mistakes that can put an organisation at risk.
Commenting on the study, Alexey Polyakov, head of the Global Emergency Response Team at Kaspersky Lab, said: ‚In the past, our corporate support team received complaints unrelated to product functionality. For example, some customers complained that our products could not remove all the viruses from a network. After some quick analysis we discovered that the products did in fact successfully detect and remove malware, but this malware kept coming back ‚ over and over again. So over the last 12 months, by actively engaging with our corporate users we have noticed that the majority of virus-related incidents occur due to underestimated design issues or unnoticed weaknesses in corporate security policies.‚
Why Your Corporate Network May Be Vulnerable
The biggest mistake is to ignore network share access rights ‚ responsible for 35% of incidents. In such a case there might be open sharing with access rights configured as ‚full access‚ to everyone on an internal file server or end-user work desktop, e.g., a shared public document workspace where all documents are stored. Sooner or later this can become a prominent source of malware redistribution throughout the organisation.
Modern malware takes advantage of existing vulnerabilities. A network with just a single missing patch can be put at serious risk. And this is a common issue seen mostly in small to medium organisations with end-users numbering less than 500. These organisations either do not have enough expertise or ignore patching completely. As such, this mistake is responsible for 25% of incidents.
Use of multiple vendor anti-malware solutions (15% of incidents) may lead to a situation where it is hard to mitigate malware attacks. This may occur if one of the vendors does not respond fast enough to attacks. Delays in responses may run to days, weeks or even months. During this time the solution of another vendor would detect and remove malware, but only in its part of the network ‚ and malware would attack it from the unprotected side. Alexey Polyakov concluded, ‚From our experience we see that security admin spends a lot of time working with multiple vendors’ support services in finding and fixing a problem.‚
A partially protected environment (15% of incidents) is where an anti-malware solution is installed on part of the network, leaving other resources unprotected.
Firmware vulnerability (5% of incidents) may be exploited by attackers if security admin forget to monitor hardware devices, such as routers, firewalls and other network appliances, to see if they need patching.
And another relatively infrequent mistake (also 5% of incidents) is to believe that software downloaded from the Web is always perfectly sound software.
Product of the Day6 days ago
Naspers invests R42-m in public transport
Product of the Day5 days ago
Opera launches Hype in SA
People 'n' Privacy5 days ago
POPI is NOT coming to get you
Stream of the Day6 days ago
E3: What to expect from Ubisoft Forward
People 'n' Issues5 days ago
Loyalty points get tax break
Stream of the Day5 days ago
Square Enix summer showcase comes to E3
Cybersecurity4 days ago
Biometrics set to replace passwords
People 'n' Issues4 days ago
SA needs national strategy for digital public service