RSS Facebook Share Twitter Share LinkedIn Share DubaiPRNetwork.com on Instagram Share

Heartbleed, Windows XP, and Adobe Flash Expose Systemic Shortcomings

Dubai, United Arab Emirates

Cyber threats, data breaches and high-risk vulnerabilities have continued to dominate the first half of 2014 as seen in Trend Micro Incorporated’s (TYO: 4704; TSE: 4704) second quarter security roundup report, “Turning the Tables on Cybercrime: Responding to Evolving Cybercrime Tactics.”

The severity of these attacks intensified against financial and banking institutions as well as retail outlets. Total attacks have exposed more than 10 million personal records as of July 2014 and strongly indicate the need for organizations to adopt a more strategic approach to safeguarding digital information.

These incident attacks in the second quarter affecting consumer’s personal information included theft of data such as customer names, passwords, email addresses, home addresses, phone numbers, and dates of birth. These types of personal privacy breaches have affected organization’s sales and earnings while leaving customers unable to access accounts and dealing with service disruption. As a result many countries have begun developing stricter privacy and data collection policies to begin dealing with this problem.

As of July 15, 2014, more than 400 data breach incidents have been reported, creating the need for organizations to identify and understand their core data in order to protect and build an effective defense strategy to keep them secure. A change in mindset, organizations initially need to determine which information they regard as “core data” before devising a plan on how to protect it.

“Organizations must treat information security as a primary component of a long-term business strategy rather than handling security issues as tertiary, minor setbacks,” said Raimund Genes, CTO, Trend Micro. “Similar to having a business strategy to improve efficiency, a well-thought-out security strategy should also improve current protection practices that achieve long-term benefits. The incidents observed during this quarter further establish the need for a more comprehensive approach to security.”

Highlights of the report include:

  • Critical vulnerabilities created havoc among information security professionals and the public: High-risk vulnerabilities affected various components of Internet browsing and Web services, including server-side libraries, OSs, mobile apps and browsers.

  • Escalation in the severity and volume of attacks: The severity of attacks against organizations highlighted the importance of incident response planning and organization-wide security awareness.

  • Cybercriminals counter online banking and mobile platform developments: Deployment of mobile ransomware and two-factor authentication-breaking malware has emerged in response to technological developments in the online banking and mobile platforms.

  • Digital Life and Internet of Everything (IOE) improved way of life with emerging vulnerabilities: The 2014 FIFA World Cup held in Brazil was one of the most popular sporting events in recent history. As such, users faced various threats related to the event—one of the most widely used social engineering hooks this quarter.

  • Global law enforcement partnerships lead to arrests: By sharing research findings with law enforcement agencies, financial loss prevention from cybercrime has proven effective.

“The reported attacks in the second quarter reveal that the wide spectrum of cyber threats can have a disastrous impact globally,” said JD Sherry, vice president of technology and solutions, Trend Micro. “Implementing a strategic incident response plan by forging collaborations, both internally and externally, will provide agencies and industries the resources to respond and protect against current threats to information security.”

For the complete report, please visit: http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-turning-the-tables-on-cyber-attacks.pdf.

ENDS

About Trend Micro

Trend Micro Incorporated (TYO: 4704; TSE: 4704), the global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years’ experience, we deliver top-ranked client, server and cloud-based security that fits our customers’ and partners’ needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ global threat intelligence data mining framework, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

Additional information about Trend Micro Incorporated and its products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://NewsRoom.TrendMicro.com and as part of an RSS feed at www.trendmicro.com/rss. Or follow our news on Twitter at @TrendMicro

Media Contact

Steve Baron

Wallis Marketing Consultants

Office: (+971) 4390 1950

TrendMicro@wallis-mc.com

PR Submited on DubaiPrNetwork.com

Posted by : DubaiPRNetwork.com Editorial Team
Viewed 10176 times
PR Category : Information Technology
Posted on :Wednesday, August 13, 2014  3:26:00 PM UAE local time (GMT+4)
Previous Article Previous Story : Pioneer Gulf Brings TAD to the UAE
Next Story : emt Distribution partners with Ipswitch to target the fast e...Next Article