<img src="https://ws.zoominfo.com/pixel/0nVRFDqEc4KEsx6wmKaS" width="1" height="1" style="display: none;">

BTB Industry Report Score Card for Check Point's cybersecurity report

BTB Scorecard

Every year cybersecurity solution vendors release reports citing their take on the latest industry trends and threats.  Some of these reports are insightful and useful while others are thinly disguised marketing pieces.  We considered releasing one of our own but, rather than adding to our readers’ to-do lists, we decided to take some burden off your shoulders and provide a crib notes review of these releases.  With our Industry Report Scorecard series, we take key cybersecurity industry reports and boil them down into easy to read, quick-hitting summaries of the best information, key trends and top take-aways that we believe are actionable and productive to helping business leaders better manage their security posture throughout their organization.

Here we dive in to Check Point Research’s 2020 Cybersecurity Report. Readers will note that it has quite a bit of good information on the cybersecurity happenings of 2019 but it is more a compilation of research from numerous sources than independent research. While fairly long, the report could be a good resource for those looking to justify cybersecurity spending.   Key findings we’ve culled from the report include:

  • Cloud is a target: attacks directly targeting public cloud providers are on the rise.
  • Cybercrime is lucrative, with $1.5 Trillion stolen annually
  • The most prevalent malware families continue to be successful, with over 84% of attributed to one of the six most popular.

In addition to analyzing the report and its findings, we also provide our own recommendations on how you can protect your organization against cyberattacks, like those noted in the report, and improve your security posture overall.  Simple solutions such as awareness training, MFA, vulnerability and patch management solutions, penetration testing and strong access controls can all make a significant difference to your risk of attack.

View our scorecard  for a full analysis of the report, key takeaways and recommended steps to minimize the risk a cybersecurity attack poses to your organization.



Contact Us

Related Posts