Study showing high-rate of malware infection in organizations indicates a need for modern technology and different approaches A recent analysis of network traffic in thousands of organizations found the majority of them were hosting malware and bots, a clear signal that it is time for companies to move quickly to modern-day methods for detecting malicious software, experts say.A report released this week on the analysis performed by security vendor Check Point Software Technologies had enough scary bullet points to keep most CSOs up at night.Two of the most troubling were that 84 percent of the organizations had systems infected with malware and nearly three fourth’s of the study’s subjects had at least one bot on their network.Standalone numbers, particularly on infection rates, do not necessarily point to a serious problem, since not all malware is the same. Some are far more serious than others. “Malware percentages, malware infection counts and all those kinds of things are somewhat nebulous in nature,” Tyler Shields, analyst for Forrester Research, said. “It is sometimes hard to define exactly what an infection is and exactly what a piece of malware is.”What are troubling in the 2014 Security Report are the trends. Check Point found the percentage of organizations with someone downloading malware every two hours or less grew threefold to 58 percent in 2013 from 14 percent in 2012. The study also found that the percentage of organizations with a bot increased to 73 percent from 63 percent year to year. Check Point also found 77 percent of the bots were active for more than four weeks.What these numbers show is that traditional signature-based security, such as anti-virus software, “is dead,” as Brian Dye, Symantec’s senior vice president for information security, told The Wall Street Journal this week.“We don’t think of anti-virus as a moneymaker in any way,” Dye said.That’s a telling statement from a company whose business depended on selling AV software for more than two decades.Unfortunately, too many companies still depend on AV technology, which contributes to the high numbers cited in studies like Check Point’s. Those businesses have to shift tactics toward looking for events in hardware, software and network traffic that would point to an anomaly indicative of malware.“My recommendation is to spend more money on legitimate detection, as opposed to relying on detection that has been antiquated and hasn’t worked for the better part of a decade,” Shields said. Examples of more effective approaches would include egress filtering, which is the practice of monitoring and possibly restricting the flow of information moving from one network to another.Other options include intrusion detection systems and detonation chamber technology that can be used to isolate potential malware for examination.Stricter policies that restrict the downloading of files from unidentified sites would also help, Kellman Meghu, head of security engineering for Check Point, said. Having a strict policy that all executable files have to be preapproved would go a long way toward reducing malware infections.“It may seem like a burden, but the reality is the burden of trying to clean up potentially thousands of machines is far larger,” Meghu said. As last year’s Target breach showed, technology alone is not enough to prevent the theft of 10s of millions of customer records and credit card data.A network-monitoring tool from vendor FireEye alerted the retailer’s security personnel of malware on the network before the data was stolen. However, no one acted on the warning, so the $1.6 million Target spent on installing the tool did not matter.“The technology is there to help, but you still need intelligence and human brainpower wrapped around it to make sense out of what the technology is trying to tell you,” Chris Camejo, director of assessment services at NTT Com Security, said. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe