SlideShare a Scribd company logo
1 of 24
Download to read offline
2016 Trends in
Cybersecurity:
A Quick Guide to
the Most Important
Insights in Security
2 2016 Trends in Cybersecurity
For 10 years, Microsoft has been studying and analyzing the
threat landscape of exploits, vulnerabilities, and malware.
We’ve used data gathered from more than 600 million com-
puters worldwide to develop one of the most complete se-
curity data sets in the world. Our year-round research is then
collected and published in The Microsoft Security Intelligence
Report, a globally accredited, 160-page report that compre-
hensively addresses the security landscape.
This year, in an effort to drive awareness of key insights and
trends, we’ve also developed A Quick Guide to the Most
Important Insights in Security, an abridged, to-the-point re-
source that readers can use to learn the important factors in
the complex matrix of Cybersecurity.
In this eBook, we’ve captured our Top 10 key findings. Read on
to learn critical information about vulnerability rates, exploits
in key software programs, the locations with the highest in-
fection rates, and much more. With more than 6,000 vulner-
abilities disclosed per year across the industry, it’s extremely
important to ensure that all of the software in your IT environ-
ment is assessed and updated. Here are our Top 10 key find-
ings to help increase your security level.
Severity of Vulnerabilities
Declining Java Exploits
Stronger Enterprise Protection
Global Security Concerns
Extent of Exploits Kit
Most Commonly Detected Objects
New Application Vulnerabilities
Increased Trojan Levels
Continued Complexity of Threats
Platform Agnostic Vulnerabilities
4
6
8
10
12
14
16
18
20
22
The Trends
4 2016 Trends in Cybersecurity
41.8 percent of all
vulnerability disclosures
are rated as highly severe
—a three-year high.
2016 Trends in Cybersecurity - Severity of Vulnerabilites
Why it matters
Vulnerability disclosures are revelations
of software vulnerabilities to the public at
large. Disclosures can come from a variety of
sources, including publishers of the affected
software, security software vendors, indepen-
dent security researchers, and even malware
creators. Attackers and malware routinely
attempt to use unpatched vulnerabilities to
compromise and victimize organizations.
Vulnerability disclosures across the industry
increased 9.4 percent between the first and
second halves of 2015, to just above 3,300.
These are the high-severity vulnerabilities that
security teams dread as they might enable
remote attackers. With more than 6,000 vul-
nerabilities publicly disclosed per year across
the industry, it’s extremely important that all
software in your IT environment gets assessed
and updated on a regular basis. Install soft-
ware patches promptly, monitor networks for
suspicious activity, and quarantine devices
that exhibit unusual behavior.
Industry-wide vulnerability disclosures each half year into the second half of 2015
6 2016 Trends in Cybersecurity
Encounters with Java
exploits are on the decline.
6 2016 Trends in Cybersecurity - Declining Java Exploits
Why it matters
Attackers used to favor Java exploita-
tion, but that is no longer the case. This
decrease is likely the result of several
important changes in the way web
browsers evaluate and execute Java
applets. Security teams can prioritize
their efforts now on higher priority risks.
Java users should continue to install se-
curity patches as they become available
to continue guarding against potential
future attacks.
Trends for the top Java exploits detected and blocked by Microsoft real-time antimalware products in
the second half of 2015
8 2016 Trends in Cybersecurity
Consumer computers
encounter 2X the number of
threats as compared to
enterprise computers.
2016 Trends in Cybersecurity - Stronger Enterprise Protection
Why it matters
Enterprise environments typically implement
defense-in-depth measures, such as enterprise
firewalls, that prevent a certain amount of malware
from reaching users’ computers. Consequently,
enterprise computers tend to encounter malware at
a lower rate than consumer computers. The en-
counter rate for consumer computers was about 2.2
times as high as the rate for enterprise computers.
Meanwhile, enterprise (domain-based) computers
encountered exploits nearly as often as consumers’
computers (non-domain), despite encountering
less than half as much malware as non-domain
computers overall. This tells CISOs that exploits are
an issue for organizations and staying up-to-date
with security updates and the latest software is their
best defense. Despite these trends, you can secure
your company’s assets by understanding the threat
landscape and devising a security strategy across
all fronts, including: identity and access credentials,
apps and data, network devices and infrastructure.
By adopting a proactive security stance and taking
advantage of the latest in multi-factor authentica-
tion, machine learning and analytics technologies,
you can harden your company’s defenses against
cyberattacks, and be equipped to respond in the
event of a breach.
Malware and unwanted software encounter rates for domain-based and non-domain computers.
2%
4%
6%
8%
10%
12%
14%
16%
18%
Browser
Modifers
Trojans WormsS oftware
Bundlers
Downloaders
&
Droppers
Obfuscators
&
Injectors
Adware Exploits Viruses Other Backdoors Randomware Password
Stealers &
Monitoring
Tools
Domain Non-domain
10 2016 Trends in Cybersecurity
Locations with the highest
malware infection rates were
Mongolia, Libya, the Palestinian
territories, Iraq, and Pakistan.
10 2016 Trends in Cybersecurity - Global Security Concerns
Why it matters
Malware is unevenly distributed around
the world and each location has its own
mix of threats. By studying the areas of
the world that are highly impacted with
malware and comparing them to the
least infected parts of the world, we can
try to discover what technical, economic,
social, and political factors influence re-
gional malware infection rates. This infor-
mation might help to inform future public
policy that, in turn, could lead to reduced
malware infection rates in highly impact-
ed parts of the world.
A previous study is also available
Infection rates by country/region
12 2016 Trends in Cybersecurity
Exploit kits account for
40 percent of the most
commonly encountered
exploits.
2016 Trends in Cybersecurity - Extent of Exploits Kit
Why it matters
Exploit kits are collections of exploits bundled
together and sold as commercial software or
as a service. Prospective attackers buy or rent
exploit kits on malicious hacker forums and
through other illegitimate outlets. A typical kit
comprises a collection of webpages that con-
tain exploits for several vulnerabilities in popular
web browsers and browser add-ons. When the
attacker installs the kit on a malicious or com-
promised web server, visitors who don’t have
the appropriate security updates installed are
at risk of having their computers compromised
through drive-by download attacks. Exploit kits
enable lower skilled attackers to perform more
sophisticated attacks.
Understanding which exploits and exploit kits
are being used by attackers helps security
teams protect their organizations.
Quarterly encounter rate trends for the exploit families most commonly detected and
blocked by Microsoft real-time antimalware products in the second half of 2015, shaded
according to relative prevalence
14 2016 Trends in Cybersecurity
Adobe Flash Player objects were
the most commonly detected type
of object, appearing on more than
90 percent of malicious pages over
a one-year period.
14 2016 Trends in Cybersecurity - Most Commonly Detected Objects
Why it matters
This data tells security teams that at-
tackers have shifted their attacks host-
ed on malicious web pages from Java
to Flash Player. Knowing this makes it
easier to plan mitigations for malicious
webpages. It also illustrates the impor-
tance of keeping Adobe Flash Player
updated. Users should prioritize
installing Flash security updates to help
protect against this rising threat.
ActiveX controls detected on malicious webpages through IExtensionValidation in 2015, by control type
16 2016 Trends in Cybersecurity
44.2 percent of all disclosed
vulnerabilities are found in
applications other than web
browsers and operating
system applications.
2016 Trends in Cybersecurity - New Application Vulnerabilities
Why it matters
Many security teams focus their efforts
on patching operating systems and web
browsers. But vulnerabilities in those
two types of software usually account
for a minority of the publicly disclosed
vulnerabilities. The majority of vulner-
abilities are in applications. Security
teams need to spend appropriate time
on assessing and patching these vul-
nerabilities. Otherwise, they could be
missing the bulk of vulnerabilities in their
environments.
To increase protection on the network,
identify unsanctioned apps and enforce
your corporate policies regarding cloud
resources, and monitor activity for any-
thing unusual.
Industrywide operating system, browser, and application vulnerabilities, 1H13–2H15
18 2016 Trends in Cybersecurity
Encounters with Trojans, a prevalent
category of malware that uses
social engineering to trick users,
increased by 57 percent, and
remained at elevated levels.
18 2016 Trends in Cybersecurity - Increased Trojan Levels
Why it matters
Knowledge is power! Understanding which
types of threats people in your organization are
most likely to encounter helps organizations
prioritize mitigations, including training people
to identify such threats.
Trojans claim to be one thing, like a document
or video, but are really a tool that attackers use
to trick people into taking some action that isn’t
in their best interest, like installing malware on
their system or lowering their security settings.
This makes Trojans one of attackers’ favorite
tools. Knowing this, and looking at how the top
Trojans in your area of the world behave, will
help you protect your organization better.
Educate your workforce about common Tro-
jan tricks, including fake web headlines with
provocative titles and spoofed emails. Encour-
age workers to use personal devices for social
media and web surfing instead of devices
connected to your corporate network.
Encounter rates for significant malware categories
20 2016 Trends in Cybersecurity
The prevalence of any particular threat can vary
dramatically, depending on the country and the
nature of the threat, which is one of the reasons
why there’s no silver bullet for achieving “perfect”
security. For example, Russia and Brazil had nearly
triple the worldwide average encounter rates for
some types of threats.
2016 Trends in Cybersecurity - Continued Complexity of Threats
Why it matters
Understanding what strategies and
tactics attackers are using in parts of
the world where you have operations
will allow you to better protect those
operations. There are parts of the
world where ransomware is encoun-
tered far more than other locations;
similarly, with Trojans, and exploits,
and other malware. Use the data in the
Security Intelligence Report to under-
stand the threats your organization is
most likely going to encounter and to
inform your security plan.
Threat category prevalence worldwide and in the 10 locations with the most computers
reporting encounters.
22 2016 Trends in Cybersecurity
In any six month period, less
than 10 percent of vulnerability
disclosures are found in
Microsoft software.
22 2016 Trends in Cybersecurity - Platform Agnostic Vulnerabilities
Why it matters
If your organization only focuses on
patching vulnerabilities in your most
commonly used software, you are
likely not managing all the vulner-
abilities present in your IT environ-
ment. It’s important to know if you
need to take action on any of the
other nearly 3,000 vulnerabilities
that could be in your organization’s
environment.
Device encryption and consistent
compliance with IT rules can help
reduce the odds of a breach. If you
detect suspicious behavior, block
and quarantine the device off the
network until the threat is identified
and removed.
Vulnerability disclosures for Microsoft and non-Microsoft products, 1H13–2H15
24 2016 Trends in Cybersecurity
To learn more about these and other findings, download the Security Intelligence Report, or visit:
www.microsoft.com/security
© 2016 Microsoft Corporation. All rights reserved. This document is for informational purposes only. Microsoft makes no
warranties, express or implied, with respect to the information presented here.

More Related Content

What's hot

Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decgusbarrett
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreVeracode
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingYogeshIJTSRD
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteJeremiah Grossman
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Veracode
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksMark D. Webster, Ph.D.
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Imperva
 
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusSarah Vanier
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...ESET Middle East
 
Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016Oscar Romano
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016Andrey Apuhtin
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec
 
Cisco amp everywhere
Cisco amp everywhereCisco amp everywhere
Cisco amp everywhereCisco Canada
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Proofpoint
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Security
 

What's hot (20)

Cloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-decCloud activ8 state of ransomware report_2021-dec
Cloud activ8 state of ransomware report_2021-dec
 
The Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t IgnoreThe Four(ish) Appsec Metrics You Can’t Ignore
The Four(ish) Appsec Metrics You Can’t Ignore
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
A Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration Testing
 
Symantec intelligence report august 2015
Symantec intelligence report august 2015Symantec intelligence report august 2015
Symantec intelligence report august 2015
 
State of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon InstituteState of Web Application Security by Ponemon Institute
State of Web Application Security by Ponemon Institute
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
Defending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware AttacksDefending Your Institution Against Ransomware Attacks
Defending Your Institution Against Ransomware Attacks
 
Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4Web Application Attack Report, Edition #4
Web Application Attack Report, Edition #4
 
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen AntivirusFive Reasons to Look Beyond Math-based Next-Gen Antivirus
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
Protecting Enterprise - An examination of bugs, major vulnerabilities and exp...
 
Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016Reporte de Seguridad de Cisco 2016
Reporte de Seguridad de Cisco 2016
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
Midyear security-report-2016
Midyear security-report-2016Midyear security-report-2016
Midyear security-report-2016
 
Symantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence ReportSymantec Cyber Security Intelligence Report
Symantec Cyber Security Intelligence Report
 
Cisco amp everywhere
Cisco amp everywhereCisco amp everywhere
Cisco amp everywhere
 
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
Adapted from an ESG report - Seeing Is Securing - Protecting Against Advanced...
 
Cisco Web and Email Security Overview
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
 
SentinelOne Buyers Guide
SentinelOne Buyers GuideSentinelOne Buyers Guide
SentinelOne Buyers Guide
 

Similar to En msft-scrty-cntnt-e book-cybersecurity

Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelIRJET Journal
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportJames Gachie
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report Steve Fantauzzo
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37Felipe Prado
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enAndrey Apuhtin
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyserTim Youm
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application SecuritySaadSaif6
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks- Mark - Fullbright
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security reportMarco Antonio Agnese
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessIndusfacePvtLtd
 

Similar to En msft-scrty-cntnt-e book-cybersecurity (20)

Research Paper
Research PaperResearch Paper
Research Paper
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
Cisco asr-2016-160121231711
Cisco asr-2016-160121231711Cisco asr-2016-160121231711
Cisco asr-2016-160121231711
 
Cisco Annual Security Report
Cisco Annual Security ReportCisco Annual Security Report
Cisco Annual Security Report
 
Cisco 2016 Annual Security Report
Cisco 2016 Annual Security ReportCisco 2016 Annual Security Report
Cisco 2016 Annual Security Report
 
Cisco Annual Security Report 2016
Cisco Annual Security Report 2016Cisco Annual Security Report 2016
Cisco Annual Security Report 2016
 
Cisco 2016 Security Report
Cisco 2016 Security Report Cisco 2016 Security Report
Cisco 2016 Security Report
 
INSECURE Magazine - 37
INSECURE Magazine - 37INSECURE Magazine - 37
INSECURE Magazine - 37
 
185
185185
185
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Trendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-enTrendlabs 1h-2016-security-roundup-en
Trendlabs 1h-2016-security-roundup-en
 
Unified application security analyser
Unified application security analyserUnified application security analyser
Unified application security analyser
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Rapport X force 2014
Rapport X force 2014Rapport X force 2014
Rapport X force 2014
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber AttacksTurning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 

Recently uploaded

Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdfMatthew Sinclair
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 

Recently uploaded (20)

Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 

En msft-scrty-cntnt-e book-cybersecurity

  • 1. 2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security
  • 2. 2 2016 Trends in Cybersecurity For 10 years, Microsoft has been studying and analyzing the threat landscape of exploits, vulnerabilities, and malware. We’ve used data gathered from more than 600 million com- puters worldwide to develop one of the most complete se- curity data sets in the world. Our year-round research is then collected and published in The Microsoft Security Intelligence Report, a globally accredited, 160-page report that compre- hensively addresses the security landscape. This year, in an effort to drive awareness of key insights and trends, we’ve also developed A Quick Guide to the Most Important Insights in Security, an abridged, to-the-point re- source that readers can use to learn the important factors in the complex matrix of Cybersecurity. In this eBook, we’ve captured our Top 10 key findings. Read on to learn critical information about vulnerability rates, exploits in key software programs, the locations with the highest in- fection rates, and much more. With more than 6,000 vulner- abilities disclosed per year across the industry, it’s extremely important to ensure that all of the software in your IT environ- ment is assessed and updated. Here are our Top 10 key find- ings to help increase your security level.
  • 3. Severity of Vulnerabilities Declining Java Exploits Stronger Enterprise Protection Global Security Concerns Extent of Exploits Kit Most Commonly Detected Objects New Application Vulnerabilities Increased Trojan Levels Continued Complexity of Threats Platform Agnostic Vulnerabilities 4 6 8 10 12 14 16 18 20 22 The Trends
  • 4. 4 2016 Trends in Cybersecurity 41.8 percent of all vulnerability disclosures are rated as highly severe —a three-year high. 2016 Trends in Cybersecurity - Severity of Vulnerabilites
  • 5. Why it matters Vulnerability disclosures are revelations of software vulnerabilities to the public at large. Disclosures can come from a variety of sources, including publishers of the affected software, security software vendors, indepen- dent security researchers, and even malware creators. Attackers and malware routinely attempt to use unpatched vulnerabilities to compromise and victimize organizations. Vulnerability disclosures across the industry increased 9.4 percent between the first and second halves of 2015, to just above 3,300. These are the high-severity vulnerabilities that security teams dread as they might enable remote attackers. With more than 6,000 vul- nerabilities publicly disclosed per year across the industry, it’s extremely important that all software in your IT environment gets assessed and updated on a regular basis. Install soft- ware patches promptly, monitor networks for suspicious activity, and quarantine devices that exhibit unusual behavior. Industry-wide vulnerability disclosures each half year into the second half of 2015
  • 6. 6 2016 Trends in Cybersecurity Encounters with Java exploits are on the decline. 6 2016 Trends in Cybersecurity - Declining Java Exploits
  • 7. Why it matters Attackers used to favor Java exploita- tion, but that is no longer the case. This decrease is likely the result of several important changes in the way web browsers evaluate and execute Java applets. Security teams can prioritize their efforts now on higher priority risks. Java users should continue to install se- curity patches as they become available to continue guarding against potential future attacks. Trends for the top Java exploits detected and blocked by Microsoft real-time antimalware products in the second half of 2015
  • 8. 8 2016 Trends in Cybersecurity Consumer computers encounter 2X the number of threats as compared to enterprise computers. 2016 Trends in Cybersecurity - Stronger Enterprise Protection
  • 9. Why it matters Enterprise environments typically implement defense-in-depth measures, such as enterprise firewalls, that prevent a certain amount of malware from reaching users’ computers. Consequently, enterprise computers tend to encounter malware at a lower rate than consumer computers. The en- counter rate for consumer computers was about 2.2 times as high as the rate for enterprise computers. Meanwhile, enterprise (domain-based) computers encountered exploits nearly as often as consumers’ computers (non-domain), despite encountering less than half as much malware as non-domain computers overall. This tells CISOs that exploits are an issue for organizations and staying up-to-date with security updates and the latest software is their best defense. Despite these trends, you can secure your company’s assets by understanding the threat landscape and devising a security strategy across all fronts, including: identity and access credentials, apps and data, network devices and infrastructure. By adopting a proactive security stance and taking advantage of the latest in multi-factor authentica- tion, machine learning and analytics technologies, you can harden your company’s defenses against cyberattacks, and be equipped to respond in the event of a breach. Malware and unwanted software encounter rates for domain-based and non-domain computers. 2% 4% 6% 8% 10% 12% 14% 16% 18% Browser Modifers Trojans WormsS oftware Bundlers Downloaders & Droppers Obfuscators & Injectors Adware Exploits Viruses Other Backdoors Randomware Password Stealers & Monitoring Tools Domain Non-domain
  • 10. 10 2016 Trends in Cybersecurity Locations with the highest malware infection rates were Mongolia, Libya, the Palestinian territories, Iraq, and Pakistan. 10 2016 Trends in Cybersecurity - Global Security Concerns
  • 11. Why it matters Malware is unevenly distributed around the world and each location has its own mix of threats. By studying the areas of the world that are highly impacted with malware and comparing them to the least infected parts of the world, we can try to discover what technical, economic, social, and political factors influence re- gional malware infection rates. This infor- mation might help to inform future public policy that, in turn, could lead to reduced malware infection rates in highly impact- ed parts of the world. A previous study is also available Infection rates by country/region
  • 12. 12 2016 Trends in Cybersecurity Exploit kits account for 40 percent of the most commonly encountered exploits. 2016 Trends in Cybersecurity - Extent of Exploits Kit
  • 13. Why it matters Exploit kits are collections of exploits bundled together and sold as commercial software or as a service. Prospective attackers buy or rent exploit kits on malicious hacker forums and through other illegitimate outlets. A typical kit comprises a collection of webpages that con- tain exploits for several vulnerabilities in popular web browsers and browser add-ons. When the attacker installs the kit on a malicious or com- promised web server, visitors who don’t have the appropriate security updates installed are at risk of having their computers compromised through drive-by download attacks. Exploit kits enable lower skilled attackers to perform more sophisticated attacks. Understanding which exploits and exploit kits are being used by attackers helps security teams protect their organizations. Quarterly encounter rate trends for the exploit families most commonly detected and blocked by Microsoft real-time antimalware products in the second half of 2015, shaded according to relative prevalence
  • 14. 14 2016 Trends in Cybersecurity Adobe Flash Player objects were the most commonly detected type of object, appearing on more than 90 percent of malicious pages over a one-year period. 14 2016 Trends in Cybersecurity - Most Commonly Detected Objects
  • 15. Why it matters This data tells security teams that at- tackers have shifted their attacks host- ed on malicious web pages from Java to Flash Player. Knowing this makes it easier to plan mitigations for malicious webpages. It also illustrates the impor- tance of keeping Adobe Flash Player updated. Users should prioritize installing Flash security updates to help protect against this rising threat. ActiveX controls detected on malicious webpages through IExtensionValidation in 2015, by control type
  • 16. 16 2016 Trends in Cybersecurity 44.2 percent of all disclosed vulnerabilities are found in applications other than web browsers and operating system applications. 2016 Trends in Cybersecurity - New Application Vulnerabilities
  • 17. Why it matters Many security teams focus their efforts on patching operating systems and web browsers. But vulnerabilities in those two types of software usually account for a minority of the publicly disclosed vulnerabilities. The majority of vulner- abilities are in applications. Security teams need to spend appropriate time on assessing and patching these vul- nerabilities. Otherwise, they could be missing the bulk of vulnerabilities in their environments. To increase protection on the network, identify unsanctioned apps and enforce your corporate policies regarding cloud resources, and monitor activity for any- thing unusual. Industrywide operating system, browser, and application vulnerabilities, 1H13–2H15
  • 18. 18 2016 Trends in Cybersecurity Encounters with Trojans, a prevalent category of malware that uses social engineering to trick users, increased by 57 percent, and remained at elevated levels. 18 2016 Trends in Cybersecurity - Increased Trojan Levels
  • 19. Why it matters Knowledge is power! Understanding which types of threats people in your organization are most likely to encounter helps organizations prioritize mitigations, including training people to identify such threats. Trojans claim to be one thing, like a document or video, but are really a tool that attackers use to trick people into taking some action that isn’t in their best interest, like installing malware on their system or lowering their security settings. This makes Trojans one of attackers’ favorite tools. Knowing this, and looking at how the top Trojans in your area of the world behave, will help you protect your organization better. Educate your workforce about common Tro- jan tricks, including fake web headlines with provocative titles and spoofed emails. Encour- age workers to use personal devices for social media and web surfing instead of devices connected to your corporate network. Encounter rates for significant malware categories
  • 20. 20 2016 Trends in Cybersecurity The prevalence of any particular threat can vary dramatically, depending on the country and the nature of the threat, which is one of the reasons why there’s no silver bullet for achieving “perfect” security. For example, Russia and Brazil had nearly triple the worldwide average encounter rates for some types of threats. 2016 Trends in Cybersecurity - Continued Complexity of Threats
  • 21. Why it matters Understanding what strategies and tactics attackers are using in parts of the world where you have operations will allow you to better protect those operations. There are parts of the world where ransomware is encoun- tered far more than other locations; similarly, with Trojans, and exploits, and other malware. Use the data in the Security Intelligence Report to under- stand the threats your organization is most likely going to encounter and to inform your security plan. Threat category prevalence worldwide and in the 10 locations with the most computers reporting encounters.
  • 22. 22 2016 Trends in Cybersecurity In any six month period, less than 10 percent of vulnerability disclosures are found in Microsoft software. 22 2016 Trends in Cybersecurity - Platform Agnostic Vulnerabilities
  • 23. Why it matters If your organization only focuses on patching vulnerabilities in your most commonly used software, you are likely not managing all the vulner- abilities present in your IT environ- ment. It’s important to know if you need to take action on any of the other nearly 3,000 vulnerabilities that could be in your organization’s environment. Device encryption and consistent compliance with IT rules can help reduce the odds of a breach. If you detect suspicious behavior, block and quarantine the device off the network until the threat is identified and removed. Vulnerability disclosures for Microsoft and non-Microsoft products, 1H13–2H15
  • 24. 24 2016 Trends in Cybersecurity To learn more about these and other findings, download the Security Intelligence Report, or visit: www.microsoft.com/security © 2016 Microsoft Corporation. All rights reserved. This document is for informational purposes only. Microsoft makes no warranties, express or implied, with respect to the information presented here.