By Charles Leaver

All types of businesses hit by malware

Threats to company servers abound, and the wide proliferation of attacks means that enterprises must always be on guard if they wish to defend themselves from incursion. The emergence of the Heartbleed bug – a vulnerability in OpenSSL – has drawn particular attention to the need for businesses to implement endpoint security and control in order to minimize the possibility of a malicious incursion. As CNNMoney points out, there are many potential repercussion stemming from Heartbleed, and recovery may not be an easy process. A recently released study on the digital threat landscape provides even more proof that security should not be taken for granted, and that organization should take the most stringent endpoint security measures to protect their operations.

Study finds that malware is active within all companies it examined
The recent study took the form of an examination of different enterprises across industrial sectors. What researchers found was a highly concerning statistic: 100 percent of the businesses analyzed had website traffic directed toward malicious sites. The revelation that all of the business networks scrutinized were in some way tied to malware only further emphasizes the need for companies to safeguard their platforms.

One of the reasons such safeguarding is necessary is that malware comes in so many different shapes and sizes. The vast expanse of malicious strains makes it extremely difficult, and often outright impossible, to ever identify the culprit behind an attack. As the report pointed out, there was a significant degree of variance among the malware it tracked, with some malware strains arriving via hijacked infrastructure, others beginning their attack through an ostensibly “blank” website, and still others harnessing government, military and educational institutions.

The reason malware is so successful is because it piggybacks off weakness
Like any successful criminal operation, malware seeks to exploit vulnerability. As the report pointed out, this takes the form of a highly successful process carried out by hackers. The cybercriminal begins by infecting an entry point like the and public cloud platforms – places without rigorous endpoint security. By first inhabiting the public cloud, it makes it easier to break into a company’s perimeter, where it is then only a few short steps to the inside of its data center containing private information. The ease with which hackers navigate these channels should provide every business with significant motivation to invest in endpoint protection and software.

Get the General Here