<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>"I had no idea my network printers are talking to China!" exclaimed Gary Woodward, network administrator of the West Memphis School District in Arkansas.&nbsp; This is a typical reaction when customers first install ThreatSTOP and find that their network is infested with botnets and active malware from all the rogue places primarily in Eastern Europe and China.&nbsp; This is their "Houston, we've got a problem!" moment.&nbsp; See the <a title="WMSD case study" href="http://www.threatstop.com/sites/default/files/documents/WMSDcasestudy.pdf" target="_blank">case study</a> for more details.</p> <!--more--><p>The surprise and shock come from 3 misconceptions:</p> <p>1.&nbsp; There is still a lack of general awareness about the vastly different nature of botnets and active malware and the damage they can do compared to virus and spam which are yesterday's nuisances.&nbsp; The whole category of botnets, active malware and advanced persistent threats are the primary security problems of the day and the foreseeable future.</p> <p>2.&nbsp; "I've got XYZ that's protecting me already."&nbsp; In WMSD's case, Gary thought he was protected by Vyatta’s NAT (network address translation), a M86 content filter administered statewide by the state, and a free OpenDNS as a backup.&nbsp; In fact, time and time again, wherever we go, we find very bad stuff lurking inside a customer's network regardless of what they were using as security solutions.&nbsp;&nbsp; Cisco, Symantec, Checkpoint, SonicWall, Palo Alto Networks, doesn't make a difference. That's why we say that the current products, which are primarily signature and packet inspection-based, are ineffective in catching this "new" class of malware.&nbsp; They were designed for the old class of problems and give a false sense of security.&nbsp; We call them the "70% and 3 days late" solutions.</p> <p>3.&nbsp; Finally, there is naivete. "Why should someone from Latvia attack me?&nbsp; I've got nothing valuable!"&nbsp; Welcome to the reality of sophisticated criminal syndicates from around the world attacking anyone connected to the Internet with impunity almost for free using victims' own computers.&nbsp; Talk about the perfect crime!&nbsp; While the Fortune 1000 organizations can afford the best security money can buy--and even they are <strong>not</strong> immune to breaches--it is the vast number of small-medium organizations that are prime targets of cybercrime precisely because they don't have the resources and the vigilant attitude.&nbsp; Two stats suffice here:</p> <p>1.&nbsp; Visa reports that 95% of credit card data breaches come from small issuers.</p> <p>2.&nbsp; Verizon and the U.S. Secret Service reported that the % of reported attacks on SMEs (small-medium enterprises) rose from 27% to 63% from 2009-2010.</p> <p>What's the message?&nbsp; There are 3:</p> <p>1.&nbsp; Botnets/active malware is the network problem of the day that is not solved by the prevailing security products in the market.</p> <p>2.&nbsp; Everyone is a a target and potential victim, especially small organizations.&nbsp; Lack of awareness, naivete and a false sense of security are dangerous and expensive attitudes to have.</p> <p>3.&nbsp; ThreatSTOP offers the most cost effective <a title="TS homepage" href="http://www.threatstop.com" target="_blank">cloud service</a> based on IP Reputation that solves this big problem by enabling your existing firewalls to block bad traffic bidirectionally.&nbsp; It can be deployed within the hour and protect you immediately.&nbsp; You can sign up for a free trial right on www.threatstop.com.</p></span>