{"id":1434,"date":"2014-02-10T16:00:59","date_gmt":"2014-02-10T16:00:59","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1434"},"modified":"2020-02-26T18:39:19","modified_gmt":"2020-02-26T16:39:19","slug":"the-threat-landscape-in-2014-why-businesses-are-at-risk","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/the-threat-landscape-in-2014-why-businesses-are-at-risk\/1434\/","title":{"rendered":"The threat landscape in 2014: why businesses are at risk"},"content":{"rendered":"<p>Kaspersky Lab published a survey entitled \u201c<a href=\"https:\/\/www.kaspersky.com\/business-security\/threat-landscape-report?cid=b2b_sm_Blog_tl\" target=\"_blank\" rel=\"noopener nofollow\">The threat landscape: A practical guide from the Kaspersky Lab experts<\/a>\u201c, dedicated to the current cybersecurity situation and main trends in this field. As we have pointed out in a <a href=\"https:\/\/business.kaspersky.com\/the-threat-landscape-in-2014-epidemics-followed-by-targeted-attacks\/\" target=\"_blank\" rel=\"noopener nofollow\">previous post<\/a>, massive epidemics are being replaced with targeted attacks, and businesses are becoming the primary target for the cybercriminals.<\/p>\n<p>Generally speaking, the threat landscape is still mostly dominated by attacks targeted at random victims whose computers are vulnerable to particular infections. But targeted attacks are also quite prominent, and there is every reason to expect an increase in their happenings.<\/p>\n<p>\u201cThe aim [of targeted attacks] is to get a foothold in a target company, steal corporate data or damage a company\u2019s reputation. We are also now in an era when a malicious code can be used as a cyberweapon. While an organization may not be in the direct firing line, it could suffer \u201ccollateral damage\u201d if it isn\u2019t adequately protected.<\/p>\n<p>It\u2019s easy to read the headlines in the media and draw the conclusion that targeted attacks are a problem only for large organizations. However, any organization can become a victim. All organizations hold data that could be of value to cybercriminals; and they can also be used as a \u201cstepping-stone to reach other companies\u201d, the survey says.<\/p>\n<p>This is why businesses have become so attractive to cybercriminals: attackers are now interested in everything that can be monetized. Businesses operate using technologies, intellectual property, finances and personal data.<\/p>\n<p>Competitors, or so-called \u201cunfriendly states\u201d, desire technology and intellectual property. Personal data is valuable since it can be used to steal an individual\u2019s money, so such data is a hot commodity on the black market for the same reason.<\/p>\n<p>Even medium-sized companies possess something valuable. At the same time, small companies often assume that no one pays attention to them, and they do not care much about protecting their infrastructure, data and finance. Attackers are well aware of this and use it.<\/p>\n<p>According to Kaspersky Lab\u2019s survey, now businesses are generally quite aware of cybercrime threats. The opinions of IT specialists on the threat landscape are provided in the diagram below.<\/p>\n<p>The pattern is quite predictable. System administrators take delicate care of antivirus databases, keeping them up to date and defending IT perimeters from remote access and hacking attempts. The companies are least concerned with organizing a centralized control of used applications, installing software updates and training their employees.<\/p>\n<div class=\"pullquote\">fter reading the headlines, you may think that only larger entities are subject to targeted attacks. However, any organization can become a victim as all organizations hold data that could be of value to cybercriminals.<\/div>\n<p>At the same time, the most real threats, like exploits, phishing and attacks (e.g., drive-by attacks), are associated with exploiting vulnerabilities in legitimate software as well as with the fact that employees can seldom recognize threats in time just because they do not know much or anything at all about them. This adds to security problems, which, like many others, are easier solved in advance rather than after the damage has been done.<\/p>\n<p>See more details about threats to businesses and vulnerabilities of companies in Kaspersky Lab\u2019s survey \u201c<a href=\"https:\/\/www.kaspersky.com\/business-security\/threat-landscape-report?cid=b2b_sm_Blog_tl\" target=\"_blank\" rel=\"noopener nofollow\">The Threat Landscape<\/a>\u201c.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Kaspersky Lab published a survey entitled \u201cThe threat landscape: A practical guide from the Kaspersky Lab experts\u201c, dedicated to the current cybersecurity situation and main trends in this field. As<\/p>\n","protected":false},"author":209,"featured_media":16278,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[251,2069],"class_list":{"0":"post-1434","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-corporate-security","10":"tag-threat-landscape"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/the-threat-landscape-in-2014-why-businesses-are-at-risk\/1434\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/the-threat-landscape-in-2014-why-businesses-are-at-risk\/1434\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/the-threat-landscape-in-2014-why-businesses-are-at-risk\/1434\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/corporate-security\/","name":"corporate security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=1434"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1434\/revisions"}],"predecessor-version":[{"id":26056,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/1434\/revisions\/26056"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/16278"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=1434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=1434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=1434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}