Is Every Enterprise Under Attack?


It is an unfortunate reality that enterprises exist in a world rife with malicious incursions. For companies that lack the proper defenses, the next attacker may literally be lurking around the next cyber corner. But according to a new study on business security, even people who are cognizant of the threat landscape may be underestimating the power of its attacks.

Annual Security Report Finds 100 Percent of Businesses Studied Actively Deal With Malware
A recent security report that took a look at businesses revealed a shocking discovery: 100 percent of companies examined had Internet traffic that was heading to websites run by malware authors.

One central problem behind the growing proliferation of malware is the ease with which it can find its way into a private system. That is because, as the security report points out, most malware starts by entering a sphere that is eminently accessible: the Internet and a bevy of online services, clients, apps and marketplaces. Because these platforms lack the authentication infrastructure to keep the bad guys out, hackers are able to roam free.

From these public networks, the threats will advance to a campus network, which puts them in closer proximity to the corporate infrastructure. Within this campus platform, malware begins to spread, preparing for the launch that will catapult it into the enterprise security network. Then cybercriminals are able to gather the offensive tools necessary to breach a company’s perimeter. From there, it can be a short road to the holy grail for any hacker: a business’ data center, from which valuable and potentially profit-reaping information can be exfiltrated.

According to PCPro, many attacks are carried out via Java. “Java provides an attack surface that is too big for criminals to ignore [so it] is the exploit that criminals choose first, since it delivers the best return on investment,” PCPro quoted the report as saying.

The Realm of Threats is Far More Dangerous Than it Was 10 Years Ago
A central point advanced in the report is that the malware climate of today looks nothing like it did a decade ago. As the report states, “Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major disruption to organizations.”

For this reason, the methods that enterprises use to secure their identities from hackers must develop a commensurate level of sophistication. Otherwise, businesses place themselves in a precarious position where their identity, and therefore their private information, is vulnerable to attack.

One of the key ways businesses can defend their identities is through a strong authentication strategy. A central means of carrying out this plan is by enacting two-factor authentication. True to its title, defending in depth will provide additional protective measures through an added wall of security.

When it comes to keeping hackers out of your business, there is no such thing as being overcautious. Companies that don’t take suitable preventive measures end up paying dearly both in revenue losses and, perhaps worse still, a loss of consumer trust. Avoid that situation entirely with a robust authentication plan.


Entrust provides identity-based security solutions that empower enterprises, consumers, citizens and websites in more than 5,000 organizations spanning 85 countries. Entrust's identity-based approach offers the right balance between affordability, expertise and service. With more than 125 patents granted and pending, these world-class solutions include strong authentication, physical and logical access, credentialing, mobile security, fraud detection, digital certificates, SSL and PKI.


Add to the Conversation