In today's connected world, security is an ongoing process,
not a point-in-time solution.
Organizations are spending more than ever on IT security, both to comply with internal and regulatory requirements and to protect their data from cyber threats. Yet each year, high-profile data breaches continue to fill the headlines, sabotaging the reputations, relationships, and revenue of the businesses that are victimized.
It’s clear that cyber-crimes are alive and well on the global stage and will continue to be pervasive as long as organizations delay taking the necessary defense measures to stop threats from slipping through the cracks. In the 2015 Dell Security Annual Threat Report, we’ll present the most common attacks that were observed by the Dell SonicWALL Threat Research Team in 2014 and the ways we expect emergent threats to affect businesses of all sizes throughout 2015. Our goal is not to frighten, but to inform and provide organizations of all sizes with practical advice that will help them adjust their practices to more effectively prepare for and prevent attacks, even from threat sources that have yet to emerge.
Key findings include:
• a surge in point-of-sale (POS) malware and attacks;
• a dramatic increase in Secure Sockets Layer (SSL) and Transport Layer Security (TLS) encrypted Internet traffic; and
• twice the attacks on supervisory control and data acquisition (SCADA) systems.
The data was gathered by the Dell Global Response Intelligence Defense (GRID) Network, which sources information from a number of devices and resources including:
• more than one million security sensors in more than 200 countries;
• activity from honeypots in Dell’s threat centers;
• malware/IP reputation data from tens of thousands of firewalls and email security devices around the globe;
• shared threat intelligence from more than 50 industry collaboration groups and research organizations;
• intelligence from freelance security researchers; and
• spam alerts from millions of computer users protected by Dell SonicWALL email security devices.
2015 Energy Industry Cybersecurity Report
Strategic Cybersecurity: A Toolkit for Prioritizing, Coordinating, and Transforming Your Cybersecurity Program