SlideShare a Scribd company logo
Looking Back: 20 Years of Malware Evolution
MALWARE EVOLUTION
THE SCALE OF THE THREAT
1
NEW VIRUS
EVERY HOUR
1994
1
NEW VIRUS
EVERY MINUTE
2006
1
NEW VIRUS
EVERY SECOND
2011
310,000
NEW SAMPLES
EVERY DAY
2016
The evolving threat landscape2
Main Figures and Statistics
IT THREAT EVOLUTION: Q1 2016
MAIN STATISTICS Q1 2016
4
Kaspersky Lab solutions repelled 228,420,754 attacks launched from online resources
located all over the world.
74,001,808 unique URLs were recognized as malicious by web antivirus components.
Crypto ransomware attacks were blocked on 372,602 computers of unique users.
Kaspersky Lab mobile security products detected:
2,045,323 installation packages
4,146 new malicious ransomware trojans
2,896 mobile banking Trojans
VULNERABLE APPLICATIONS USED BY
CYBERCRIMINALS
5
The top position in the Q1 2015 rankings was occupied by
the Browsers category (64%), which includes exploits
targeting Web Browsers. This category was also at the top
of the rankings in the last three quarters of 2015.
In Q1 2016, exploits for Adobe Flash Player remained
popular. During the reporting period two new
vulnerabilities in this software were detected:
CVE-2015-8651
CVE-2016-1001
The first exploit pack to add support for these
vulnerabilities was Angler.
One notable event in the first quarter was the use of an
exploit for Silverlight - CVE-2016-0034. At the time of
publication, this vulnerability is used by the Angler and
RIG exploit packs.
Main Figures and Statistics
MOBILE THREATS: Q1 2016
MOBILE THREATS – MAIN STATISTICS Q1 2016
7
Kaspersky Lab detected 2,045,323 malicious installation packages – this is 11 times greater
than in Q4 2015, and 1.2 times more than in Q3 2015.
MOBILE THREATS – MAIN STATISTICS Q1 2016
8
In Q1 2016, adware programs continued to top the rating of detected malicious objects for mobile
devices. The share of adware programs grew 13 p.p. compared to Q4 2015, and reached 42.7%.
Notably, this is lower than in Q3 2015 (52.5%).
MOBILE BANKING TROJANS
9
Over the reporting period, we detected 4,146 mobile banking Trojans, which is 1.7 times more
than in the previous quarter. (percentage of all users attacked)
Current Topics
MALWARE INCIDENTS
11
KASPERSKY SECURITY FOR MOBILE
Proactieve beveiligings-, beheer- en controlelagen voor mobiele endpoints
Mobile Security
• Meerlaagse
anti-malware
• Web Protection
• Detectie van
rooting/jailbreak
Mobile Device
Management
• Exchange
ActiveSync
• iOS MDM
• Samsung KNOX
Mobile Application
Management
• App wrapping
• App Control
• Selective Wipe
Diefstalbescherming
• Vergrendelen/wissen
• Opsporen/Waarschu-
wen/Foto
• SIM Watch
Self Service Portal
• BYOD mogelijk
• Certificaten ophalen
• Diefstalbescherming
Gecentraliseerd beheer
• Alle grote mobiele
platforms
• Andere IT-
beveiligingsdomeinen
RANSOMWARE – PROBLEM OF THE YEAR?
12
2016 has only just got underway, but the first three months have already seen the same amount of
cyber-security events that just a few years ago would have seemed normal for a whole year. The main
underlying trends remained the same, while there was significant growth in trends related to
traditional cybercrime, especially mobile threats and global ransomware epidemics.
Ransomware became the main theme of the quarter after knocking targeted attacks from the top of
the most popular threat rating. Unfortunately, this is a situation that will continue to evolve, and those
behind the extortion could well end up being named "problem of the year".
RANSOMWARE
13
The overall number of encryptor modifications in our Virus Collection to date is at least 15,000.
Nine new encryptor families and 2,900 new modifications were detected in Q1.
In Q1 2016, 372,602 unique users were attacked by encryptors, which is 30% more than in the
previous quarter. Approximately 17% of those attacked were in the corporate sector.
Number of ransomware samples in our collection Number of users attacked by ransomware
14
APPLICATION CONTROL - WHITELISTING
Application
Startup Control
Application
Privilege Control
Controle op
vulnerability
Gedrags-
analyse
CLOUD
Whitelists
Lokale
Whitelists
TELEWERKEN
15
Organisaties die telewerken toestaan, behoren een beleid uit te vaardigen dat de
voorwaarden en beperkingen definieert voor het telewerken.
Device
Control
Application
Control
Web
Control
BEHANDELEN VAN MEDIA
16
Uw organisatie dient procedures te hebben voor het beheer van verwijderbare media
waarop persoonsgegevens worden opgeslagen en die de beveiligingsperimeter van uw
organisatie kunnen verlaten. Denk hierbij ook aan de verwijderbare media in apparatuur
zoals multifunctionele printers en copiers.
Uw organisatie moet de nodige maatregelen bepalen om fysieke media (inclusief papieren
documenten) die persoonsgegevens bevatten tijdens het transport te beschermen tegen
onbevoegde toegang, misbruik of corruptie.
BESCHERMING TEGEN MALWARE
17
Ter bescherming tegen malware (voorkomen, ontdekken en verwijderen/herstellen) behoort
uw informaticadienst anti-malware en herstelsoftware te installeren en regelmatig te
updaten, waarbij computers en media als voorzorgsmaatregel of routematig worden
gescand.
De uitgevoerde scan behoort onder meer:
alle bestanden die via netwerken of via elke vorm van opslagmedium zijn ontvangen, vóór
gebruik op malware te scannen; bijlagen en downloads vóór gebruik. Op malware te
scannen en dit op verschillende cruciale plaatsen in uw netwerkconfiguratie (mailservers,
computers, netwerktoegang...);internetpagina’s op malware te scannen. Nauwkeurige en
informatieve waarschuwingsberichten in het geval van een reële bedreiging kunnen het
bewustzijn van de gebruikers vergroten
MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.*
18
0%
20%
40%
60%
80%
100%
20 40 60 80 100
N of independent tests/reviews
ScoreofTOP3places
Bitdefender
Sophos
G DATA
Symantec
F-Secure Intel Security (McAfee)
Trend Micro
Avira
Avast
AVG
ESET
Quick Heal
Microsoft
Panda Security
In 2015 Kaspersky Lab products participated in 94
independent tests and reviews. Our products were
awarded 60 firsts and achieved 77 top-three finishes.
Kaspersky Lab
1st places – 60
Participation in 94
tests/reviews
TOP 3 = 82%
BullGuard
* Notes:
• According to summary results of independent tests
in 2015 for corporate, consumer and mobile
products.
• Summary includes independent tests conducted by :
AV-Comparatives, AV-Test, Dennis Technology
Labs, MRG Effitas, NSS Labs, PC Security Labs,
VirusBulletin.
• Tests performed in these programs assess all
protection technologies against known, unknown
and advanced threats.
• The size of the bubble reflects the number of 1st
places achieved.
19
IN DETAIL
WebCollaboration MailTOTAL
Vulnerability
Assesment
Inventories &
License Control
Software
Distribution Patch Management OS Deployment
Data Protection / Encryptie
ADVANCED
Mobile Application
Management
Mobile
Device Management
Device
Control
Application
Control
Web
Control
Beveiliging van file servers
Mobile Endpoint
Security
SELECT
Anti-malware + firewall
Kaspersky
Security
Center
CORE
Cloudondersteuning via het
Kaspersky Security Network (KSN) Endpoint Management Infrastructuur

More Related Content

What's hot

Madam synopis
Madam synopisMadam synopis
Madam synopis
uttarkar
 
INTSUM
INTSUMINTSUM
Continuous Monitoring for Web Application Security
Continuous Monitoring for Web Application SecurityContinuous Monitoring for Web Application Security
Continuous Monitoring for Web Application Security
Cenzic
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Jacob Tranter
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
Veracode
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...
Cenzic
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
Andrey Apuhtin
 
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
Lan & Wan Solutions
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
Eric Zhuo
 
State of Application Security: State of Piracy
State of Application Security: State of PiracyState of Application Security: State of Piracy
State of Application Security: State of Piracy
IBM Security
 
Spyware
SpywareSpyware
Spyware
Farheen Naaz
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
unnecessary34
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
Kim Aarenstrup
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
MarketingArrowECS_CZ
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
Teodoro Cipresso
 
Building an Android Scale Incident Response Process
Building an Android Scale Incident Response ProcessBuilding an Android Scale Incident Response Process
Building an Android Scale Incident Response Process
Priyanka Aash
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
amy.covington215944
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic Analysis
Ahmed Banafa
 

What's hot (20)

Madam synopis
Madam synopisMadam synopis
Madam synopis
 
INTSUM
INTSUMINTSUM
INTSUM
 
Continuous Monitoring for Web Application Security
Continuous Monitoring for Web Application SecurityContinuous Monitoring for Web Application Security
Continuous Monitoring for Web Application Security
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Lookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysisLookout pegasus-android-technical-analysis
Lookout pegasus-android-technical-analysis
 
160415 lan and-wan-ctap
160415 lan and-wan-ctap160415 lan and-wan-ctap
160415 lan and-wan-ctap
 
Whitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6ppWhitepaper - CISO Guide_6pp
Whitepaper - CISO Guide_6pp
 
State of Application Security: State of Piracy
State of Application Security: State of PiracyState of Application Security: State of Piracy
State of Application Security: State of Piracy
 
Spyware
SpywareSpyware
Spyware
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin KleczynskiKaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
Kaseya Connect 2011 - Malwarebytes - Marcin Kleczynski
 
Ibm risk management-30min
Ibm risk management-30minIbm risk management-30min
Ibm risk management-30min
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
Building an Android Scale Incident Response Process
Building an Android Scale Incident Response ProcessBuilding an Android Scale Incident Response Process
Building an Android Scale Incident Response Process
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
Zero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic AnalysisZero-Day Vulnerability and Heuristic Analysis
Zero-Day Vulnerability and Heuristic Analysis
 

Viewers also liked

Eurostat study on the long-term budgetary implications of pension costs
Eurostat study on the long-term budgetary implications of pension costsEurostat study on the long-term budgetary implications of pension costs
Eurostat study on the long-term budgetary implications of pension costs
Thierry Debels
 
ホリデーシーズンウェビナーQ&A
ホリデーシーズンウェビナーQ&AホリデーシーズンウェビナーQ&A
ホリデーシーズンウェビナーQ&A
Payoneer
 
De boche in Leopold III (P-Magazine)
De boche in Leopold III (P-Magazine)De boche in Leopold III (P-Magazine)
De boche in Leopold III (P-Magazine)
Thierry Debels
 
わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞
わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞
わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞
iacer
 
Segundo relatório anual sobre incidentes de segurança em redes de automação ...
Segundo relatório anual sobre incidentes de segurança em redes  de automação ...Segundo relatório anual sobre incidentes de segurança em redes  de automação ...
Segundo relatório anual sobre incidentes de segurança em redes de automação ...
TI Safe
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
Lan & Wan Solutions
 
Quick Study for SY0-401 CompTIA Security+ Certification Exam with Practice
Quick Study for SY0-401 CompTIA Security+ Certification Exam with PracticeQuick Study for SY0-401 CompTIA Security+ Certification Exam with Practice
Quick Study for SY0-401 CompTIA Security+ Certification Exam with Practice
PopeTeri
 
A Short Introduction To Seattle
A Short Introduction To SeattleA Short Introduction To Seattle
A Short Introduction To Seattle
Howard Creech
 
Attract Top International Clients and Scale Your Business
Attract Top International Clients and Scale Your BusinessAttract Top International Clients and Scale Your Business
Attract Top International Clients and Scale Your Business
Payoneer
 
SMB Guide-to-Ransomware
SMB Guide-to-RansomwareSMB Guide-to-Ransomware
SMB Guide-to-Ransomware
Dave Augustine
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Benelux
 
Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!
Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!
Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!
Payoneer
 
わかる英文法 Grammar in Use Unit 25 can, could
わかる英文法 Grammar in Use Unit 25 can, couldわかる英文法 Grammar in Use Unit 25 can, could
わかる英文法 Grammar in Use Unit 25 can, could
iacer
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
Sophos Benelux
 
What To Do with Employee Engagement Survey Results - Change Them
What To Do with Employee Engagement Survey Results - Change ThemWhat To Do with Employee Engagement Survey Results - Change Them
What To Do with Employee Engagement Survey Results - Change Them
PowerRound Corporation
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTM
Alphorm
 
Employee engagement by vinay ravindran (www.vinayravindran.com)
Employee engagement by vinay ravindran (www.vinayravindran.com)Employee engagement by vinay ravindran (www.vinayravindran.com)
Employee engagement by vinay ravindran (www.vinayravindran.com)
Vinay Ravindran, SPHRi™
 

Viewers also liked (18)

Eurostat study on the long-term budgetary implications of pension costs
Eurostat study on the long-term budgetary implications of pension costsEurostat study on the long-term budgetary implications of pension costs
Eurostat study on the long-term budgetary implications of pension costs
 
ホリデーシーズンウェビナーQ&A
ホリデーシーズンウェビナーQ&AホリデーシーズンウェビナーQ&A
ホリデーシーズンウェビナーQ&A
 
Bang xs kch
Bang xs kchBang xs kch
Bang xs kch
 
De boche in Leopold III (P-Magazine)
De boche in Leopold III (P-Magazine)De boche in Leopold III (P-Magazine)
De boche in Leopold III (P-Magazine)
 
わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞
わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞
わかる中級英文法 Grammar in Use Unit 96 ing ed系の形容詞
 
Segundo relatório anual sobre incidentes de segurança em redes de automação ...
Segundo relatório anual sobre incidentes de segurança em redes  de automação ...Segundo relatório anual sobre incidentes de segurança em redes  de automação ...
Segundo relatório anual sobre incidentes de segurança em redes de automação ...
 
Inside forti os-v524-r5
Inside forti os-v524-r5Inside forti os-v524-r5
Inside forti os-v524-r5
 
Quick Study for SY0-401 CompTIA Security+ Certification Exam with Practice
Quick Study for SY0-401 CompTIA Security+ Certification Exam with PracticeQuick Study for SY0-401 CompTIA Security+ Certification Exam with Practice
Quick Study for SY0-401 CompTIA Security+ Certification Exam with Practice
 
A Short Introduction To Seattle
A Short Introduction To SeattleA Short Introduction To Seattle
A Short Introduction To Seattle
 
Attract Top International Clients and Scale Your Business
Attract Top International Clients and Scale Your BusinessAttract Top International Clients and Scale Your Business
Attract Top International Clients and Scale Your Business
 
SMB Guide-to-Ransomware
SMB Guide-to-RansomwareSMB Guide-to-Ransomware
SMB Guide-to-Ransomware
 
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out forSophos Day Belgium - The IT Threat Landscape and what to look out for
Sophos Day Belgium - The IT Threat Landscape and what to look out for
 
Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!
Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!
Payoneer&马帮在线分享会 - ERP令您的电商之路更轻松!
 
わかる英文法 Grammar in Use Unit 25 can, could
わかる英文法 Grammar in Use Unit 25 can, couldわかる英文法 Grammar in Use Unit 25 can, could
わかる英文法 Grammar in Use Unit 25 can, could
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
What To Do with Employee Engagement Survey Results - Change Them
What To Do with Employee Engagement Survey Results - Change ThemWhat To Do with Employee Engagement Survey Results - Change Them
What To Do with Employee Engagement Survey Results - Change Them
 
Alphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTMAlphorm.com Formation Sophos UTM
Alphorm.com Formation Sophos UTM
 
Employee engagement by vinay ravindran (www.vinayravindran.com)
Employee engagement by vinay ravindran (www.vinayravindran.com)Employee engagement by vinay ravindran (www.vinayravindran.com)
Employee engagement by vinay ravindran (www.vinayravindran.com)
 

Similar to IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:

2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
Ioannis Aligizakis, M.Sc.
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
Online Business
 
The Modern Malware Review March 2013
The Modern Malware Review March 2013The Modern Malware Review March 2013
The Modern Malware Review March 2013
- Mark - Fullbright
 
The modern-malware-review-march-2013
The modern-malware-review-march-2013 The modern-malware-review-march-2013
The modern-malware-review-march-2013
Комсс Файквэе
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
Bitglass
 
Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response
Adrian Guthrie
 
Malware evolution and Endpoint Detection and Response Technology
Malware evolution and Endpoint Detection and Response  TechnologyMalware evolution and Endpoint Detection and Response  Technology
Malware evolution and Endpoint Detection and Response Technology
Adrian Guthrie
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
Ricardo Resnik
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
Mustafa YÜKSEL
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
Felipe Prado
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
Deb Birch
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
IndusfacePvtLtd
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
Marco Antonio Agnese
 
Check point 2015-securityreport
Check point 2015-securityreportCheck point 2015-securityreport
Check point 2015-securityreport
EIINSTITUT
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
Tim Youm
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive Defense
Panda Security
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
IBM Sverige
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
Kazi Sarwar Hossain
 

Similar to IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware: (20)

2016 Trends in Security
2016 Trends in Security 2016 Trends in Security
2016 Trends in Security
 
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurityEn msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
 
The Modern Malware Review March 2013
The Modern Malware Review March 2013The Modern Malware Review March 2013
The Modern Malware Review March 2013
 
The modern-malware-review-march-2013
The modern-malware-review-march-2013 The modern-malware-review-march-2013
The modern-malware-review-march-2013
 
Security O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat ProtectionSecurity O365 Using AI-based Advanced Threat Protection
Security O365 Using AI-based Advanced Threat Protection
 
Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response Malware evolution and Endpoint Detection and Response
Malware evolution and Endpoint Detection and Response
 
Malware evolution and Endpoint Detection and Response Technology
Malware evolution and Endpoint Detection and Response  TechnologyMalware evolution and Endpoint Detection and Response  Technology
Malware evolution and Endpoint Detection and Response Technology
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
Advanced Endpoint Protection
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)AppTrana SECaaS (Security as a Service)
AppTrana SECaaS (Security as a Service)
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
Check point 2015-securityreport
Check point 2015-securityreportCheck point 2015-securityreport
Check point 2015-securityreport
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive Defense
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
Michael andersson - att ligga steget före in en allt mer hotfylld värld BC14
 
Bitdefender mobile security for android
Bitdefender mobile security for androidBitdefender mobile security for android
Bitdefender mobile security for android
 

Recently uploaded

办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 

Recently uploaded (20)

办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 

IMPAKT: Verdediging aangaan t.o.v. (on)bekende ransomware:

  • 1. Looking Back: 20 Years of Malware Evolution MALWARE EVOLUTION
  • 2. THE SCALE OF THE THREAT 1 NEW VIRUS EVERY HOUR 1994 1 NEW VIRUS EVERY MINUTE 2006 1 NEW VIRUS EVERY SECOND 2011 310,000 NEW SAMPLES EVERY DAY 2016 The evolving threat landscape2
  • 3. Main Figures and Statistics IT THREAT EVOLUTION: Q1 2016
  • 4. MAIN STATISTICS Q1 2016 4 Kaspersky Lab solutions repelled 228,420,754 attacks launched from online resources located all over the world. 74,001,808 unique URLs were recognized as malicious by web antivirus components. Crypto ransomware attacks were blocked on 372,602 computers of unique users. Kaspersky Lab mobile security products detected: 2,045,323 installation packages 4,146 new malicious ransomware trojans 2,896 mobile banking Trojans
  • 5. VULNERABLE APPLICATIONS USED BY CYBERCRIMINALS 5 The top position in the Q1 2015 rankings was occupied by the Browsers category (64%), which includes exploits targeting Web Browsers. This category was also at the top of the rankings in the last three quarters of 2015. In Q1 2016, exploits for Adobe Flash Player remained popular. During the reporting period two new vulnerabilities in this software were detected: CVE-2015-8651 CVE-2016-1001 The first exploit pack to add support for these vulnerabilities was Angler. One notable event in the first quarter was the use of an exploit for Silverlight - CVE-2016-0034. At the time of publication, this vulnerability is used by the Angler and RIG exploit packs.
  • 6. Main Figures and Statistics MOBILE THREATS: Q1 2016
  • 7. MOBILE THREATS – MAIN STATISTICS Q1 2016 7 Kaspersky Lab detected 2,045,323 malicious installation packages – this is 11 times greater than in Q4 2015, and 1.2 times more than in Q3 2015.
  • 8. MOBILE THREATS – MAIN STATISTICS Q1 2016 8 In Q1 2016, adware programs continued to top the rating of detected malicious objects for mobile devices. The share of adware programs grew 13 p.p. compared to Q4 2015, and reached 42.7%. Notably, this is lower than in Q3 2015 (52.5%).
  • 9. MOBILE BANKING TROJANS 9 Over the reporting period, we detected 4,146 mobile banking Trojans, which is 1.7 times more than in the previous quarter. (percentage of all users attacked)
  • 11. 11 KASPERSKY SECURITY FOR MOBILE Proactieve beveiligings-, beheer- en controlelagen voor mobiele endpoints Mobile Security • Meerlaagse anti-malware • Web Protection • Detectie van rooting/jailbreak Mobile Device Management • Exchange ActiveSync • iOS MDM • Samsung KNOX Mobile Application Management • App wrapping • App Control • Selective Wipe Diefstalbescherming • Vergrendelen/wissen • Opsporen/Waarschu- wen/Foto • SIM Watch Self Service Portal • BYOD mogelijk • Certificaten ophalen • Diefstalbescherming Gecentraliseerd beheer • Alle grote mobiele platforms • Andere IT- beveiligingsdomeinen
  • 12. RANSOMWARE – PROBLEM OF THE YEAR? 12 2016 has only just got underway, but the first three months have already seen the same amount of cyber-security events that just a few years ago would have seemed normal for a whole year. The main underlying trends remained the same, while there was significant growth in trends related to traditional cybercrime, especially mobile threats and global ransomware epidemics. Ransomware became the main theme of the quarter after knocking targeted attacks from the top of the most popular threat rating. Unfortunately, this is a situation that will continue to evolve, and those behind the extortion could well end up being named "problem of the year".
  • 13. RANSOMWARE 13 The overall number of encryptor modifications in our Virus Collection to date is at least 15,000. Nine new encryptor families and 2,900 new modifications were detected in Q1. In Q1 2016, 372,602 unique users were attacked by encryptors, which is 30% more than in the previous quarter. Approximately 17% of those attacked were in the corporate sector. Number of ransomware samples in our collection Number of users attacked by ransomware
  • 14. 14 APPLICATION CONTROL - WHITELISTING Application Startup Control Application Privilege Control Controle op vulnerability Gedrags- analyse CLOUD Whitelists Lokale Whitelists
  • 15. TELEWERKEN 15 Organisaties die telewerken toestaan, behoren een beleid uit te vaardigen dat de voorwaarden en beperkingen definieert voor het telewerken. Device Control Application Control Web Control
  • 16. BEHANDELEN VAN MEDIA 16 Uw organisatie dient procedures te hebben voor het beheer van verwijderbare media waarop persoonsgegevens worden opgeslagen en die de beveiligingsperimeter van uw organisatie kunnen verlaten. Denk hierbij ook aan de verwijderbare media in apparatuur zoals multifunctionele printers en copiers. Uw organisatie moet de nodige maatregelen bepalen om fysieke media (inclusief papieren documenten) die persoonsgegevens bevatten tijdens het transport te beschermen tegen onbevoegde toegang, misbruik of corruptie.
  • 17. BESCHERMING TEGEN MALWARE 17 Ter bescherming tegen malware (voorkomen, ontdekken en verwijderen/herstellen) behoort uw informaticadienst anti-malware en herstelsoftware te installeren en regelmatig te updaten, waarbij computers en media als voorzorgsmaatregel of routematig worden gescand. De uitgevoerde scan behoort onder meer: alle bestanden die via netwerken of via elke vorm van opslagmedium zijn ontvangen, vóór gebruik op malware te scannen; bijlagen en downloads vóór gebruik. Op malware te scannen en dit op verschillende cruciale plaatsen in uw netwerkconfiguratie (mailservers, computers, netwerktoegang...);internetpagina’s op malware te scannen. Nauwkeurige en informatieve waarschuwingsberichten in het geval van een reële bedreiging kunnen het bewustzijn van de gebruikers vergroten
  • 18. MOST TESTED. MOST AWARDED. KASPERSKY LAB PROTECTION.* 18 0% 20% 40% 60% 80% 100% 20 40 60 80 100 N of independent tests/reviews ScoreofTOP3places Bitdefender Sophos G DATA Symantec F-Secure Intel Security (McAfee) Trend Micro Avira Avast AVG ESET Quick Heal Microsoft Panda Security In 2015 Kaspersky Lab products participated in 94 independent tests and reviews. Our products were awarded 60 firsts and achieved 77 top-three finishes. Kaspersky Lab 1st places – 60 Participation in 94 tests/reviews TOP 3 = 82% BullGuard * Notes: • According to summary results of independent tests in 2015 for corporate, consumer and mobile products. • Summary includes independent tests conducted by : AV-Comparatives, AV-Test, Dennis Technology Labs, MRG Effitas, NSS Labs, PC Security Labs, VirusBulletin. • Tests performed in these programs assess all protection technologies against known, unknown and advanced threats. • The size of the bubble reflects the number of 1st places achieved.
  • 19. 19 IN DETAIL WebCollaboration MailTOTAL Vulnerability Assesment Inventories & License Control Software Distribution Patch Management OS Deployment Data Protection / Encryptie ADVANCED Mobile Application Management Mobile Device Management Device Control Application Control Web Control Beveiliging van file servers Mobile Endpoint Security SELECT Anti-malware + firewall Kaspersky Security Center CORE Cloudondersteuning via het Kaspersky Security Network (KSN) Endpoint Management Infrastructuur

Editor's Notes

  1. In the last 19 years the number and complexity of malware incidents has increased exponentially – from only one new virus every hour in 1994. In 2016 Kaspersky Lab sees more than 310,000 new malware samples every day. That’s almost four new samples every second!
  2. 11
  3. 14
  4. 19