Bay Street News

Cryptominers Hit 10x More Organizations than Ransomware in 2018, but Only 1 in 5 IT Pros Are Aware of Infections, shows Check Point’s 2019 Security Report

Second instalment of Security Report highlights the democratization of cyber-crime through malware-as-a-service, and the biggest cyber-threats perceived by organizations

LAS VEGAS, Feb. 06, 2019 (GLOBE NEWSWIRE) — Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has published the second instalment of its 2019 Security Report.  It highlights how the tools and services used to commit cyber-crime have become democratized, with advanced attack methods now available to anyone willing to pay for them, as part of the growing ‘malware-as-a-service’ industry. 

The second instalment of the 2019 Security Report reveals the key cyber-attack trends observed by Check Point researchers during 2018, and shows the significant growth in stealthy, complex attacks designed to stay below the radar of enterprise security teams.  It also shows the types of cyberattacks which enterprise IT and security teams rate as the biggest threats to their organizations. Highlights include:

“The second instalment of our 2019 Security Report shows how cyber-criminals are successfully exploring stealthy new approaches and business models, such as malware affiliate programs, to maximize their illegal revenues while reducing their risk of detection.  But out-of-sight shouldn’t mean out-of-mind:  even though cyberattacks during 2018 have been lower-profile, they are still damaging and dangerous,” said Peter Alexander, Chief Marketing Officer of Check Point Software Technologies.  “By reviewing and highlighting these developments in the Report, organizations can get a better understanding of the threats they face, and how they prevent them impacting on their business.”

Check Point’s 2019 Security Report is based on data from Check Point’s ThreatCloud intelligence, the largest collaborative network for fighting cybercrime which delivers threat data and attack trends from a global network of threat sensors; from Check Point’s research investigations over the last 12 months; and on a brand new survey of IT professionals and C-level executives that assesses their preparedness for today’s threats.  The report examines the latest emerging threats against various industry sectors, and gives a comprehensive overview of the trends observed in the malware landscape, in emerging data breach vectors, and in nation-state cyber-attacks.  It also includes expert analysis from Check Point’s thought leaders, to help organizations understand and prepare themselves for today’s and tomorrow’s complex fifth-generation cyber-attacks and threats.

For full report go to: https://research.checkpoint.com/2019-security-report-vol-2-under-the-hood-of-cyber-crime

Follow Check Point via:
Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

About Check Point Research
Check Point Research provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point products are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally.  Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises’ cloud, network and  mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

INVESTOR CONTACT:   MEDIA CONTACT:
Kip E. Meintzer   Gil Messing
Check Point Software Technologies   Check Point Software Technologies 
+1.650.628.2040   +972.3753.4514
ir@checkpoint.com    press@checkpoint.com