IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

90% of businesses hacked via old, unpatched exploits

Companies are paying the price for failing to follow basic security guidelines

Hackers have successfully attacked nine out of 10 businesses with exploits that are more than three years old, new research has revealed.

Two-thirds of attacks over the course of Q2 2017 were ranked as either high or critical severity, Fortinet's latest Global Threat Landscape report found, while 60% of businesses were hit by an exploit relating to a flaw dating back more than a decade.

"Something we don't talk about often enough is the opportunity everyone has to limit bad consequences by employing consistent and effective cybersecurity hygiene," said Fortinet CISO Phil Quade. "Cyber criminals aren't breaking into systems using new zero-day attacks, they are primarily exploiting already-discovered vulnerabilities."

"This means they can spend more of their resources on technical innovations making their exploits difficult to detect. Newer worm-like capabilities spread infections at a rapid pace and can scale more easily across platforms or vectors."

The data reaffirms an oft-repeated mantra within the security community, that if companies do not follow basic security hygiene guidelines, their business and their users will pay the price.

The report , which collects data from three million of Fortinet's network devices and sensors deployed in customers' live production environments, also confirmed that hackers are actively exploiting businesses' working hours, with the average daily volume of attacks doubling at weekends when IT and security staff are likely to be out of the office. This led to a total of almost 45% of all exploit attempts occurring on Saturday and Sunday.

Unsurprisingly, file-sharing applications were a common vector for security threats to enter organisations. Businesses that allowed employees to use a large number of peer-to-peer file-sharing applications reported seven times as many botnets and malware instances as those who did not, while proxy applications reported a nine-fold increase.

The number of exploits is also growing, increasing 30% compared to the first three months of 2017 to 1.8 billion daily attacks.

Featured Resources

Accelerating AI modernisation with data infrastructure

Generate business value from your AI initiatives

Free Download

Recommendations for managing AI risks

Integrate your external AI tool findings into your broader security programs

Free Download

Modernise your legacy databases in the cloud

An introduction to cloud databases

Free Download

Powering through to innovation

IT agility drive digital transformation

Free Download

Recommended

CMO job description: What does a chief marketing officer do?
Business strategy

CMO job description: What does a chief marketing officer do?

9 Jun 2022
CFO job description: What does a chief financial officer do?
Business strategy

CFO job description: What does a chief financial officer do?

9 Jun 2022
What does a CISO do?
Careers & training

What does a CISO do?

12 May 2022
Business value on AWS
Whitepaper

Business value on AWS

27 Apr 2022

Most Popular

The UK's best cities for tech workers in 2022
Business strategy

The UK's best cities for tech workers in 2022

24 Jun 2022
LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

27 Jun 2022
Salaries for the least popular programming languages surge as much as 44%
Development

Salaries for the least popular programming languages surge as much as 44%

23 Jun 2022