Trend Micro's Q2 Security Round Up Highlights Need for Comprehensive
Cybersecurity Strategy to Keep Information Secure
Heartbleed, Windows XP and Adobe Flash expose systemic shortcomings
DALLAS, Aug. 12, 2014
DALLAS, Aug. 12, 2014 /PRNewswire/ --Cyber threats, data breaches and
high-risk vulnerabilities have continued to dominate the first half of 2014 as
seen in Trend Micro Incorporated's (TYO: 4704; TSE: 4704) second quarter
security roundup report, "Turning the Tables on Cybercrime: Responding to
Evolving Cybercrime Tactics." The severity of these attacks intensified
against financial and banking institutions as well as retail outlets. Total
attacks have exposed more than 10 million personal records as of July 2014 and
strongly indicate the need for organizations to adopt a more strategic
approach to safeguarding digital information.
These incident attacks in the second quarter affecting consumer's personal
information included theft of data such as customer names, passwords, email
addresses, home addresses, phone numbers, and dates of birth. These types of
personal privacy breaches have affected organization's sales and earnings
while leaving customers unable to access accounts and dealing with service
disruption. As a result many countries have begun developing stricter privacy
and data collection policies to begin dealing with this problem.
As of July 15, 2014, more than 400 data breach incidents have been reported,
creating the need for organizations to identify and understand their core data
in order to protect and build an effective defense strategy to keep them
secure. A change in mindset, organizations initially need to determine which
information they regard as "core data" before devising a plan on how to
"Organizations must treat information security as a primary component of a
long-term business strategy rather than handling security issues as tertiary,
minor setbacks," said Raimund Genes, CTO, Trend Micro."Similar to having a
business strategy to improve efficiency, a well-thought-out security strategy
should also improve current protection practices that achieve long-term
benefits. The incidents observed during this quarter further establish the
need for a more comprehensive approach to security."
Highlights of the report include:
oCritical vulnerabilities created havoc among information security
professionals and the public: High-risk vulnerabilities affected various
components of Internet browsing and Web services, including server-side
libraries, OSs, mobile apps and browsers.
oEscalation in the severity & volume of attacks: The severity of attacks
against organizations highlighted the importance of incident response
planning and organization-wide security awareness.
oCybercriminals counter online banking and mobile platform developments:
Deployment of mobile ransomware and two-factor authentication-breaking
malware has emerged in response to technological developments in the
online banking and mobile platforms.
oDigital Life and Internet of Everything (IOE) improved way of life with
emerging vulnerabilities: The 2014 FIFA World Cup held in Brazil was one
of the most popular sporting events in recent history. As such, users
faced various threats related to the event—one of the most widely used
social engineering hooks this quarter.
oGlobal law enforcement partnerships lead to arrests: By sharing research
findings with law enforcement agencies, financial loss prevention from
cybercrime has proven effective.
"The reported attacks in the second quarter reveal that the wide spectrum of
cyber threats can have a disastrous impact globally," said JD Sherry, vice
president of technology and solutions, Trend Micro. "Implementing a strategic
incident response plan by forging collaborations, both internally and
externally, will provide agencies and industries the resources to respond and
protect against current threats to information security."
For the complete report, please visit:
A blog post regarding the report can be viewed here:
About Trend Micro
Trend Micro Incorporated, a global leader in security software, strives to
make the world safe for exchanging digital information. Built on 25 years of
experience, our solutions for consumers, businesses and governments provide
layered data security to protect information on mobile devices, endpoints,
gateways, servers and the cloud. Trend Micro enables the smart protection of
information, with innovative security technology that is simple to deploy and
manage, and fits an evolving ecosystem. All of our solutions are powered by
cloud-based global threat intelligence, the Trend Micro™ Smart Protection
Network™ infrastructure, and are supported by more than 1,200 threat experts
around the globe. For more information, visit TrendMicro.com.
SOURCE Trend Micro Incorporated
Contact: Thomas Moore, firstname.lastname@example.org, 972-499-6648
Press spacebar to pause and continue. Press esc to stop.