Need help? Chat now!

Hostwinds Blog

Search results for:

The Most Secure Networks Get Hacked Anyway, Study Says Featured Image

The Most Secure Networks Get Hacked Anyway, Study Says

by: Bryon Turcotte  /  May 22, 2014

Security analysts from both the firms FireEye and Mandiant have determined in a recent study that "97 percent_" of networks, no matter how secure, "_experienced some form of breach\, "according to an_ article published on the Ars Technica website. The article indicates that the data mined from this study came from "_more than 1,600 networks over a six-month period_" that were heavily protected by "_multiple layers of network and computer security software."

According to the report, analysts placed "network and e-mail monitoring appliances_" to collect data during the timeline between "_October 2013 to March 2014." This data first showed FireEye and Mandiant, according to the article, that "three-quarters of the networks had command-and-control traffic indicating the presence of active security breaches connected to over 35,000 unique command-and-control servers." The report clarifies that analysts extracted real-time data from "monitoring devices_" which included "_1,614 FireEye appliances that had been placed on networks as part of 'proof of value' trials."

The article indicates that all of the network environments sampled had a "defense in depth architecture\, "which combines a number of security initiatives, including "_combined firewalls_" along with "_intrusion detection and prevention systems, and_ antivirus software." Even though the environments were secured, the report says the devices were still able to identify "_over 208,000 malware downloads across the monitored networks, of which 124,000 were unique malware variants._" As the article confirmed, analysts determined that each network was "_subjected to 1.6 exploits and 122 malware droppers during this six-month period._"

Read more about this study in the full article on the Ars Technica website and learn what analysts had determined within these environments during this period.

Written by Bryon Turcotte  /  May 22, 2014