Sophos: Prepare For Multi Platform Attacks

A newly released Sophos threat report heralds new forms of malware ushered in through security holes that emerge in light of increased complexity and multi-platform environments. Yes, that means an opportunity to introduce impending advanced solutions. But it also means a chance for partners to rethink security holistically, and impart that to customers in new security strategies.

  • Tweet  
  • LinkedIn  
  • Facebook  
  • Google plus  
  • Send to Kindle
  • Send to  

A Sophos Ltd. end of year threat report highlighted that new and disruptive technologies in 2012 will give rise to a host of new advanced malware in 2013-- a shift that will prompt partners to redefine security as customers continued accelerated adoption of new and complex technology trends.

In its Security Threat Report 2013, Sophos revealed that the dearth of mobile, cloud and social networking adoption has also created a slew of new security threats – and new windows for the threats to pass through -- while increasingly sophisticated malware will make a debut on the security landscape. Nothing new there.

Related articles

Up until now, however, attack methods have remained, for the most part, the same as in years prior. As in years past, the majority of compromises in 2012 occurred when users clicked on malicious links in e-mails or browsed infected Web pages carrying malicious code.

Also congruent with years past were attack methods that infected legitimate sites with malware in order to reel in unsuspecting users. According to the report, 80 percent of attacks in 2012 were redirects – the majority from legitimate sites that got hacked. And 27 percent of all cybercrime was connected to Blackhole exploit kit.

That made it easier for security partners, who were able to promote legacy antimalware solutions and emphasize age-old security best practices to customers.

But looking forward to 2013, the report projected greater availability of malware testing platforms, which will increase the likelihood of attackers stealthily gaining access to corporate networks.

And down the road, Sophos warns that users should also be wary of irreversible malware, attack toolkits with premium features, better exploit mitigation as well as an uptick of Web server mistakes and integration, privacy and security challenges stemming from complexity of multi-platform environments.

“Attacks and threats—on PCs, Macs and mobile devices—continue to evolve as does the technology to combat them,” said Gerhard Eschelbeck, Sophos chief technology officer. “As users demand more and better ways to do their jobs, IT continues to evolve…making it crucial for security technology to evolve, ensuring that end users are protected and empowered—no matter what platform, device, or operating system they choose.”

Much of the findings have already been widely reported. The threat landscape has become muddied with the rapid rise of new technologies such as mobility and cloud, making traditional security solutions obsolete in combatting advanced malware targeting these platforms. And undoubtedly security holes have emerged as users adopt new infrastructure without fully understanding the security implications or risks.

However, the report likely sets the stage for future releases of advanced security solutions from Sophos that incorporate threat intelligence and analytics -- a market in which the endpoint security will likely be placing larger bets in order to compete with industry peers in this space.

No doubt that opens up a lot of windows for partners to introduce upgraded and advanced solutions. But it also allows them to promote consulting services around security policy, compliance and strategy to get customers up to speed on new technologies and help them understand an array of new security ramifications. Looking forward, it also means that the channel will likely have to initiate a paradigm shift that takes a holistic, integrated view of security -- extending to all mobile, virtual, cloud and on-premise platforms --  in order to keep customers adequately protected.

  • Tweet  
  • LinkedIn  
  • Facebook  
  • Google plus  
  • Send to Kindle
  • Send to  
More on Channel Business
declinederivatives

US WLAN enterprise market falls 5.4 per cent in Q1 2015

Education market delayed WLAN spend due to expected 2Q 2015 E-Rate funding

Good to Great

Greatness may be just a few percentage points away

Forget 80/20; there’s a new rule in town, and following this one can mean the difference between just getting by and creating real value

Concept image of a cloud question mark

Cloud calls for new reseller business models - partner

Partner talks important cloud trends for resellers to note

conversation

HP: CIO conversations 'critical'

Avoid "hogwash" and "baloney" and meetings with lieutenants, vendor advises

Visitor comments
Add comments
blog comments powered by Disqus
In-depth
newspapers-and-glasses

Channelnomics' top five stories of the week - 29 May 2015

Check out which articles grabbed the most attention this week

Jessica Meek

Editor’s voice: The week’s channel chatter – 29 May 2015

What’s been happening this week on Channelnomics?

horse-riding444

MSPs take the reins on moving to the cloud

MSPs insist it is their own responsibility - not vendors' - to make the transition

Broken Links

Survey: Disconnects in MSP Selling Approach

LogicNow says managed service providers and IT departments aren't aligned on priorities, resulting in lost sales opportunities. The prescription, however, could prove problematic in the short term