Page 51 - Cyber Warnings
P. 51
Is Your Company s Data Being Sold on the Dark Web?
Learn how Comodo can help you for free if any of your information is already for sale on the
Dark Web.
As companies scramble to find the best ways to protect themselves from ransomware and other
types of malware and with almost daily reports of major breaches and infiltrations, public
awareness of cybersecurity may be at an all-time high…and yet, there are still some very basic,
and easy to correct, mistakes being made that put companies at risk for major data loss.
One major threat that has IT security personnel on high alert is known as “pony” malware.
Basically a Russian password thief, this type of malware performs data exfiltration on the
credentials of more than 90 applications once gaining access to a machine.
Large companies, as a whole, are typically more vulnerable to these zero-day “pony” malware
attacks, simply on a percentage-basis because there are more employees accessing more
sites, both personal and professional.
But enterprises are also more likely to be targeted because there is more for the black hats to
gain, compared to hacking smaller organizations.
According to Ponemon Institute, in 2016, a single stolen record cost companies $158. Data
breaches overall, however, set companies back approximately $4 million, on average.
Black hat hackers don’t care if they hurt your organization, as your stolen data becomes their
revenue source on the Dark Web—but you should.
Imagine a free report that can allay your fears and provide you with specifics about the areas of
vulnerability for your company. Well, look no further. Comodo is offering a no-cost Company
Threat Analysis report specifically to enterprises, companies with 1,000+ employees.
This report shows in detail the kinds of data from companies and employees that is vulnerable
to this kind of malware—and what is being sold on the Dark Web.
Enterprises in all sectors have been shocked to discover the amount of information from their
organization that is currently available for sale on the Dark Web. What stands out as a
vulnerability, from a brute force perspective, is the simplicity of it all.
As the Threat Analysis report has clearly shown our researchers, many of us are not very
vigilant about our passwords.
It is normal for many people to use the same password for multiple devices and accounts, or to
only change them slightly, by adding a “1” – very common – or a symbol, usually “!” – also very
common.
51 Cyber Warnings E-Magazine – June 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide