Security News > 2020 > March > IT security report finds 97% have suspicious network activity

IT security report finds 97% have suspicious network activity
2020-03-19 13:53

The suspicious network activities revealed in the research by Positive Technologies are traffic hiding, VPN tunneling, connections to the Tor anonymous network, and network proxying.

The 13-page study, "Top Cybersecurity Threats on Enterprise Networks," which was performed using advanced network traffic analysis tools, found that 97% of the surveyed companies show evidence of suspicious activity in their network traffic and that 81% of the companies were being subject to malicious activity.

Among the suspicious network activities revealed in the research were traffic hiding, VPN tunneling, connections to the Tor anonymous network, and network proxying, according to the report.

Ultimately, 92% of these network security threats were detected inside the perimeters of the companies that were surveyed, according to the report, which reveals the depth of the problems and the need for constant internal network monitoring.

Network traffic analysis systems can help companies fight these attacks by analyzing real-time network traffic using machine learning algorithms, behavioral analysis, rules-based detection, threat-hunting capabilities, and other tools to detect suspicious network activity, malware activity, attempted exploitation of vulnerabilities on the perimeter and inside the network, noncompliance with information security and policies, and more.


News URL

https://www.techrepublic.com/article/it-security-report-finds-97-have-suspicious-network-activity/#ftag=RSS56d97e7