point

February - 2015 - issue > CXO View Point

Unknown Files: Closing the holes in Antivirus Security

Umesh Kumar Gupta
Head of Antivirus Research-Comodo Group
Wednesday, February 4, 2015
Umesh Kumar Gupta
In a new world of constant threat hackers around the globe are working feverishly every hour, attacking large and small companies across every industry, writing malicious code to exploit your website and computer network.
Every computer, laptop and mobile device connected to your network represents a vulnerable endpoint for viruses, worms, spyware, rootkits, trojan horses and other malicious software – all of it designed to either disrupt your operations or gain access to proprietary data and information.
All of these forms of malware started out as an unknown file that was allowed to pass through into your system.
Why? Because traditional antivirus technology doesn’t prevent infection of a system, it only detects infection of a system after the breach has happened.
It’s like getting the flu shot after you have the flu.

Where are the threats happening?
With so many employees today accessing their corporate networks through endpoints such as smartphones, PCs, laptops, tablets and other mobile devices, it’s no surprise that a vast majority of businesses have already experience some sort of mobile security data breach. And companies that allow their employees to utilize personal mobile devices say the number of devices connecting to corporate networks is growing. Most estimate they have more than five times as many personal mobile devices connecting to their corporate networks than they had two years ago.

How are the attacks happening?

Share on Twitter
Share on LinkedIn
Share on facebook