90% of businesses hacked via old, unpatched exploits
Companies are paying the price for failing to follow basic security guidelines


Hackers have successfully attacked nine out of 10 businesses with exploits that are more than three years old, new research has revealed.
Two-thirds of attacks over the course of Q2 2017 were ranked as either high or critical severity, Fortinet's latest Global Threat Landscape report found, while 60% of businesses were hit by an exploit relating to a flaw dating back more than a decade.
"Something we don't talk about often enough is the opportunity everyone has to limit bad consequences by employing consistent and effective cybersecurity hygiene," said Fortinet CISO Phil Quade. "Cyber criminals aren't breaking into systems using new zero-day attacks, they are primarily exploiting already-discovered vulnerabilities."
"This means they can spend more of their resources on technical innovations making their exploits difficult to detect. Newer worm-like capabilities spread infections at a rapid pace and can scale more easily across platforms or vectors."
The data reaffirms an oft-repeated mantra within the security community, that if companies do not follow basic security hygiene guidelines, their business and their users will pay the price.
The report , which collects data from three million of Fortinet's network devices and sensors deployed in customers' live production environments, also confirmed that hackers are actively exploiting businesses' working hours, with the average daily volume of attacks doubling at weekends when IT and security staff are likely to be out of the office. This led to a total of almost 45% of all exploit attempts occurring on Saturday and Sunday.
Unsurprisingly, file-sharing applications were a common vector for security threats to enter organisations. Businesses that allowed employees to use a large number of peer-to-peer file-sharing applications reported seven times as many botnets and malware instances as those who did not, while proxy applications reported a nine-fold increase.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The number of exploits is also growing, increasing 30% compared to the first three months of 2017 to 1.8 billion daily attacks.
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Vulnerability management complexity is leaving enterprises at serious risk
News Fragmented data and siloed processes mean remediation is taking too long
By Emma Woollacott Published
-
Beat cyber criminals at their own game
Whitepaper A guide to winning the vulnerability race and protection your organization
By ITPro Published
-
Same cyberthreat, different story
Whitepaper How security, risk, and technology asset management teams collaborate to easily manage vulnerabilities
By ITPro Published
-
Three steps to transforming security operations
Whitepaper How to be more agile, effective, collaborative, and scalable
By ITPro Published
-
Should your business start a bug bounty program?
In-depth Big tech firms including Google, Apple and Microsoft offer bug bounty programs, but can they benefit smaller businesses too?
By Kate O'Flaherty Published
-
Accessing the XDR realm
Whitepaper A guide for MSPs to unleash modern security
By ITPro Published
-
JD Sports details cyber security revamp following January attack
News It hopes a multi-vendor approach will substantially improve its cyber resilience
By Connor Jones Published
-
Why zero trust strategies fail
In-depth Zero Trust is the gold standard for organizations in protecting systems from cyber attacks, but there are many common implementation pitfalls businesses must avoid
By Sandra Vogel Published