What is the value of superior detection rate? Does it really matter if your security software, your goal keeper, blocks close to 100% or close to 90% of malware attacks?
A simple answer – yes!
On average, one out of ten new zero-day malware attacks succeed as the detection software cannot anticipate the upcoming hits to the goal. The accrued costs to the company of all the related work and possible data loss are huge.
Let’s play with the numbers a bit:
80 malware that hit the goal will mean a lot of money. Both the external and internal costs can be significant. Internally, the detection, recovery, investigation etc will take a lot of time from your security officers and affected employees. However, the external repercussions can be even more staggering. Or how would you value information loss, business disruption, or revenue loss?
Neither can you sit back and relax thinking that you or your company are too small and insignificant for the attackers to target you. The game is on every day and regardless of the opponent. 79% of malware attacks are opportunity based. This means that anyone can be a target, it is just a question of who is the easiest one. The team with a weak or average goal keeper is a much easier to win over than the one with a superior goal keeper.
Malware is constantly evolving, with new tricks and features, just like the players on the field come up with new tactics to win the game. It is the popular software that is most often targeted, both based on known vulnerabilities and with new threats. So today, it is just as critical to be able to identify the clean, non-malicious software to be able to focus attention on the harmful attacks as it is for the goal keeper in the game to see the whole field to anticipate the next attack.
Think then: what if you had a super goal keeper that blocks even new or emerging malware attacks by anticipating the moves of the opponent and by having eyes even in the back?
DeepGuard detection technology is just like such a goal keeper. Continuously, DeepGuard technology is at the top of detection rate studies. The multi-layered protection is your winning team with a super goalie and the best defense team. This means that you and your business can be safe and secure in the knowledge that your goalie foresees and prevents the attacks, keeping your goal clean.
Do you ever use your personal phone to make work related calls? Or send work related e-mails? Maybe you even use it to work on Google Docs, or access company files remotely? Doing these things basically means you’re implementing a BYOD policy at your work, whether they know it or not. BYOD – that’s bring your own device – isn’t really a new trend, but it is one that’s becoming more widespread. Statistics from TrackVia suggest that younger generations are embracing BYOD on a massive scale, with nearly 70% of surveyed Millennials admitting that they use their own devices and software, regardless of their employer’s policies on the matter. This is essentially pressuring employers to accept the trend, as the alternative could mean imposing security restrictions that limit how people go about their work. Consequently, Gartner predicts that 38% of businesses will stop providing employees with devices by 2016. It kind of seems like workers are enforcing the trend, and not businesses. But it’s happening because it’s so much easier to work with phones, tablets, and computers that you understand and enjoy. Work becomes easier, productivity goes up, life becomes more satisfying, etc. This might sound like an exaggeration, and maybe it is a little bit. BYOD won’t solve all of life’s problems, but it really takes advantage of the flexibility modern technology offers. And that’s what mobility should be about, and that’s what businesses are missing out on when they anchor people to a specific device. BYOD promotes a more “organic” aspect of technology in that it’s something people have already invested in and want to use, not something that’s being forced upon them. But of course, there are complications. Recent research confirms that many of these same devices have already had security issues. It’s great to enjoy the benefits of using your own phone or tablet for sending company e-mails, but what happens when things go wrong? You might be turning heads at work by getting work done faster and more efficient, but don’t expect this to continue if you happen to download some malicious software that infiltrates your company’s networks. You’re not alone if you want to use your own phone, tablet, or computer for work. And you’re not even alone if you do this without telling your boss. But there’s really no reason not to try and protect yourself first. You can use security software to reduce the risk of data breaches or malicious infections harming your employer. And there’s even a business oriented version of F-Secure's popular Freedome VPN called Freedome for Business that can actually give you additional forms of protection, and can help your company manage an entire fleet of BYOD and company-owned devices. It’s worth bringing these concerns to an employer if you find yourself using your own devices at the office. After all, statistics prove that you’re not alone in your concerns, and your employer will most likely have to address the issue sooner rather than later if they want the company to use technology wisely.
Easter is coming up, and many people will take advantage of the holiday by visiting friends or family, or even taking a quick vacation. Mobile phones are an important travel accessory for people these days, as it lets them stay in touch with people, use some great map apps to find their way around, and use online banking and other services they need. The flip side to these wonderful aspects of mobile technology is that there are threats that become more pronounced when people are on the road. Public Wi-Fi hotspots are popular in hotels and airports because they help people avoid roaming charges. Wi-Fi in general wasn’t designed to be particularly secure, and so it exposes all kinds of sensitive information to the public. It’s so easy to monitor what people do over Wi-Fi that it took less than 20 minutes for this hacker to learn the personal details of people connected to a cafe’s hotspot. Do you ever visit café’s when you travel? I know I do. And I also know that having to worry about keeping my personal data safe when I travel is one hassle I can do without. So I sat down with F-Secure Security Advisor Sean Sullivan to talk about this. Sean travels extensively for both work and play. He gets it – worrying about mobile security is the last thing people want to do when they’re away. He gave me three quick pieces of advice to pass along to let people know what they can do to keep their mobile phones safe and secure when they’re away from home. 1. Use a PIN number or passcode to lock your phone. Losing your phone is like losing your wallet – it’s not the cash that stresses people out. It’s the information. Credit cards, driver’s license, insurance information, ID – lots of people keep this info in both their phones and wallets. If your phone gets lost or stolen that information can get out there, so if you want to keep this data secure a code is the absolute minimum. Even if your phone goes missing, a passcode or PIN can help the data stay hidden. Plus, many mobile services will have anti-theft protection and let you remotely locate your phone, but these anti-theft features won’t do you any good if whoever finds your phone can simply open your settings and disable them. Most phones let you set up passcodes to lock your phone at regular intervals (for example, every hour or every two hours). When I'm working I usually set my phone to lock every four hours, but for traveling I set it to lock every five minutes. I suggest you set yours to lock as often as you can stand. Even if it's not a long time, like at hour intervals, it's better than no protection at all. 2. Take the time to remove old files and log out of apps that you don’t need. Cleaning your phone out is important if you want to bring it traveling, especially if you use your phone for work. Phones and computers always store information about what you do. Internet browsers store a history. Apps create temporary files where they store stuff to help them run faster. A lot of apps and websites have passwords and contact information about you stored. Deleting this data only takes you a few minutes with this new free app, and can save you the hassles that come from having your personal data compromised. I’m always careful to close and even delete apps I won’t be using when I travel, and even reset automatic logins I use for work. I recommend you do the same, because if your phone goes missing and someone starts sending e-mails from your account, you might not have a job to come back to. Getting rid of work stuff is key, not only to protect you and your employer from any mishaps, but also to avoid thinking about work when you’re trying to relax. 3. There’s no excuse not to use a VPN, so get one and test it BEFORE your trip. VPNs are always a good idea. Almost every security researcher I know swears by them. They’re especially important while you’re traveling because you’re more exposed when you’re away from home. You often have to choose between using free Wi-Fi hotspots or paying roaming charges to use your mobile connection. Using a VPN like Freedome gives you a secure funnel that lets you use public Wi-Fi connections without assuming the risks. It’s especially important for budget travelers that use services like AirBnB. The sharing economy is great for travelers on a shoestring budget, but you give up some of your control over your own situation when you use these services. If you’re using someone else’s Wi-Fi you might not be able to verify that it’s safe – after all, it’s not a 5-star hotel. Using Freedome can prevent you from “sharing” information in this new economy that you’d rather keep private. These are quick, easy things you can do to keep your private information private while you’re traveling, so take this advice to heart so you can enjoy your holidays. P.S. Sullivan also suggests calling your bank ahead of time and let them know you’re traveling, so they know that charges appearing away from where you live don’t mean that your credit card was stolen. [Image by Francesco | Flickr ]