Virtualization Technology News and Information
Article
RSS
Are Hackers Profiting from Your Corporate Data on the Dark Web? Comodo Offers Free Company Threat Analysis to Help Enterprises Find Out
Zero-day Pony malware bypassing an organization's ineffective endpoint security system and gaining access to credentials for 90 applications. A university shocked that its president's accounts had been infiltrated. One company floored that its vice president of human resources was breached.  Another stunned that hundreds of its customers' login portal usernames and passwords were stolen. Could this be happening to you?

Comodo, a global innovator and developer of cybersecurity solutions and the worldwide leader in digital certificates, helped the companies above-and can help yours-find out. The firm is offering enterprises with  1,000+ employees a free 'Company Threat Analysis' to determine if their sensitive information is for sale on the Dark Web and, if so, how to prevent compromises from happening again.

According to Ponemon Institute, in 2016, a single stolen record cost companies $158. Data breaches overall, however, set companies back approximately $4 million, on average. Black hat hackers don't care if they hurt your organization, as your stolen data becomes their revenue source on the Dark Web-but you should.

Comodo's personalized reports identify if an enterprise's information has been stolen and dive into how this data became available to cybercriminals in the first place-for example, via credentials stolen from direct network access or data breaches from third-party applications. For each instance, the affected company gets the chance to review a sample of the leaked credential records and details on the attack processes, to help them understand what went wrong.

Jerald Nine, director of threat intelligence for Comodo, explained what incriminating mistake he sees most frequently, "Most company employees use the same password for multiple sites and accounts. If their networks are infiltrated by hackers, it becomes extremely easy to gather legitimate credentials that can get cybercriminals into high-value accounts. Pony malware, for example, which we recently discovered during one of these analyses, can affect insurance and benefit, payroll and social media sites-all of which house appealing credentials for buyers on the Dark Web."

Large companies are typically more vulnerable to these zero-day "Pony" malware attacks, because they have more employees and may be specifically targeted by attackers. Hackers may believe that they have more to gain targeting larger organizations.

In addition to the actual attack vector, the threat analysis assesses business risk specific to the company, such as internal data loss and customer impersonation login risks. This leads to an overview of the current cyber risk state of the company, including potential legal impacts.

Most importantly, the report concludes with actionable advice-technological recommendations on how to fill the security gaps discovered.

"It is clear that the traditional anti-virus industry has not been able to identify malware and create signatures fast enough to keep up," said Nine. "Traditional attempts to isolate malware at the endpoint use a default-allow approach and resource-intensive virtualization or sandboxing technologies that reduce endpoint performance. These have proven unworkable in most deployments."

Comodo's free 'Company Threat Analysis' not only offers interested parties the opportunity to discover vulnerabilities in their personal or company systems, it can educate them on how Comodo's solutions can solve the problems of endpoint solutions past.

Comodo Advanced Endpoint Protection, based on the firm's unique, true default-deny platform, allows the known good files, blocks the known bad files, and then isolates the unknown files in automatic containment in a virtual environment on the endpoint. Usability is never impacted, and the endpoint and network are always protected and secure-keeping sensitive data out of hackers' hands and off the Dark Web. More information is available online at https://enterprise.comodo.com/advanced-endpoint-protection.

Curious about your company's standing? If your organization has 1,000+ employees, sign up for a personalized, Comodo 'Company Threat Analysis,' at https://threatanalysis.comodo.com/.

Published Tuesday, May 09, 2017 8:41 AM by David Marshall
Filed under:
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
Calendar
<May 2017>
SuMoTuWeThFrSa
30123456
78910111213
14151617181920
21222324252627
28293031123
45678910