Real World Risk Management Practical HR Resources
Are you a new user?

print   email   Share

New Vulnerabilities Are Emerging: Addressing Multi-Vector Attacks Now Is Important

Malwarebytes recently released its annual "State of Malware" report, which found that malware threats targeting Apple's Macs are growing much faster than threats against Windows.

According to Malwarebytes, Macs experienced an average of 11 threats per computer compared with 5.8 threats per Windows computer. Mac threats increased by more than 400 percent last year, while Windows threats only increased by one percent.

Businesses bear the brunt of the increase in threats. In fact, the report stated that consumer threats actually declined by two percent but threats targeting businesses increased by 13 percent—an increase of nearly one million attacks.

The CEO of Malwarebytes stated that the growth in preinstalled malware, adware, and multi-vector attacks shows that cybercriminals are becoming more creative and persistent in their campaigns. Pradeep "Apple Mac malware threats growing faster than Windows counterparts" (Feb. 11, 2020).


As source material above highlights, you cannot assume Mac computers and devices are no longer targets of cybercriminals.

A lesser known, more sophisticated threat, are multi-vector attacks.

Multi-vector cyberattacks use multiple points of entry to infiltrate a network. They are generally automated and small enough to go undetected by firewalls and security analysts. Although your protections may catch one attempt, others can succeed.

Multi-vector attacks are obviously more difficult to stop than attacks using a single point of entry. Networks are vulnerable on a number of fronts. Multi-vector attacks utilize email, social media, databases, web browsers, USB flash drives, mobile apps, and online ads to penetrate your network.

To protect your organization from multi-vector attacks, you must shore up your defenses in all of these areas. Consider implementing multi-vector cybersecurity software that protects against both application-layer and network-layer attacks. That way, if an employee clicks on a phishing email, your software will have multiple opportunities to block the threat.

Finally, your opinion is important to us. Please complete the opinion survey:

Strengthening The Weakest Link To Prevent Social Engineering Attacks

Twitter experiences a social engineering attack. We explain why training and strong policies can help strengthen your weakest security link.

read more

Are Your Employees Ransomware Ignorant?

A new survey suggests that many employees don't know what ransomware is or how to avoid it. Read tips for protecting your organization and its data.

read more

New Vulnerabilities Are Emerging: Addressing Multi-Vector Attacks Now Is Important

Cybercriminals are using more sophisticated techniques, including attacking Macs and multi-vector attacks. Learn what steps can prevent such attacks.

read more

Cyber Awareness Leads To Better Cybersecurity

Employers must stress cybersecurity practices for teleworking employees. We examine.

read more