Two-thirds of security professionals believe their existing endpoint protection tools cannot defend their organization from a significant malware attack, according to a recent survey.

In its report, “The State of Endpoint Security in Addressing Malware and Other Modern Cyber Threats,” Minerva Labs surveyed approximately 600 security professionals, of which three-quarters said their endpoint protection solutions could prevent only 70 percent of malware infections.

Malware Keeping Pace With Endpoint Security Evolution

Even though vendors are constantly trying to improve their products and services, those defending corporate networks don’t expect the situation to improve anytime soon. In fact, 75 percent of survey respondents said they believe the rate of malware infections either stayed the same or got worse over the past year.

Ironically, the report suggested that the powerful new features being added to many endpoint security solutions are driving cybercriminals to step up the sophistication of the malware they create. That could explain why 42 percent of security professionals cited analysis evasion as their top concern, followed by fileless malware (24 percent).

When malware strikes, more than a quarter of respondents said it can take days or weeks to restore their systems to a normal state. Only 41 percent said this can be done in a matter of hours. That could leave plenty of time for cybercriminals to steal data, disrupt business operations or cause all kinds of damage.

Security Professionals’ Endpoint Protection Wish List

Chief information security officers (CISOs) and their teams have a long wish list when it comes to security tools. Thirty-nine percent said they want antimalware products that work well without consuming a lot of system resources, and 29 percent are in the market for tools that are easier to deploy and upgrade.

Finally, given the high priority on digital transformation and other IT initiatives, 17 percent of survey participants hope to invest in endpoint security technologies that don’t interfere with other business applications.

While 31 percent of survey participants said they would consider replacing their current endpoint security tools with different products, more than half said they would prefer to invest in additional layers of technology to close whatever gaps are leaving them vulnerable to a malware attack. The report’s authors suggested that this could help organizations get around the costs and potential risks of switching the products they use.

More from

What to know about new generative AI tools for criminals

3 min read - Large language model (LLM)-based generative AI chatbots like OpenAI’s ChatGPT took the world by storm this year. ChatGPT became mainstream by making the power of artificial intelligence accessible to millions.The move inspired other companies (which had been working on comparable AI in labs for years) to introduce their own public LLM services, and thousands of tools based on these LLMs have emerged.Unfortunately, malicious hackers moved quickly to exploit these new AI resources, using ChatGPT itself to polish and produce phishing…

The importance of Infrastructure as Code (IaC) when Securing cloud environments

4 min read - According to the 2023 Thales Data Threat Report, 55% of organizations experiencing a data breach have reported “human error” as the primary cause. This is further compounded by organizations now facing attacks from increasingly sophisticated cyber criminals with a wide range of automated tools. As organizations move more of their operations to the cloud, they must also become increasingly aware of the security risks and threats that come with it. It’s not enough anymore to simply have a set of…

Data never dies: The immortal battle of data privacy

4 min read - More than two hundred years ago, Benjamin Franklin said there is nothing certain but death and taxes. If Franklin were alive today, he would add one more certainty to his list: your digital profile. Between the data compiled and stored by employers, private businesses, government agencies and social media sites, the personal information of nearly every single individual is anywhere and everywhere. When someone dies, that data becomes the responsibility of the estate; but what happens to the privacy rights…

Vulnerability resolution enhanced by integrations

2 min read - Why speed is of the essence in today's cybersecurity landscape? How are you quickly achieving vulnerability resolution? Identifying vulnerabilities should be part of the daily process within an organization. It's an important piece of maintaining an organization’s security posture. However, the complicated nature of modern technologies — and the pace of change — often make vulnerability management a challenging task. In the past, many organizations had to support manual integration work to get different security systems to ‘talk’ to each…