Home  › Marketing › Strategies

You've Got Spyware; And Lots of It

  |  August 3, 2005   |  Comments

Despite security measures, spyware runs rampant on most networks -- and costs businesses plenty.

Spyware's scope now includes greynets, according to a report from FaceTime Commuinications.

Greynets are defined as applications that are downloaded and installed on end-user systems without express permission or awareness from IT departments, and often without user knowledge. These programs then use evasive techniques to traverse the network. FaceTime includes IM (define), P2P (define) file sharing, RSS and even Skype among those application it defines as greynet. Though both RSS and Skype can be useful in an organization, they can also be a potential business risk, as Frank Cabri, VP of marketing for FaceTime Communications, explained to ClickZ Stats. Cabri admits, however, the report doesn't specify the perceived risks for these technologies.

All told, FaceTime's study found companies with over 1,000 employees report 277 spyware and adware attempts or installations per month. Each security incident takes an average eight hours for IT to resolve, which amounts to a monthly cost of $132,960. Organizations greater than 100 employees report an average of 193 spyware and adware attempts or installations per month.

The reported impact of the greynets on end users' computers include slowdowns in network response times (71 percent); uncontrollable pop-up ad windows (49 percent); corrupted files (38 percent); homepage reset (37 percent); unintended toolbar additions (37 percent); and corrupted applications (26 percent).

Effects of Greynet Delivered Viruses and Spyware on End User Computers
Click on graphic to view chart

So-called greynets are currently employed by 78 percent of end-user respondents, a number expected to rise to 93 percent over the next six months. On average, IT managers reported nearly six unique greynet applications in use on their network at the time of the survey. Twenty-six percent of respondent indicated they had six or seven greynet applications; eight percent reported 10 or more greynet programs running on their networks.

Greynet Applications in Use at Work Locations August 2005
Click on graphic to view chart

Surprisingly, 77 percent of IT managers that currently have some form of perimeter security including intrusion detection and prevention, URL filtering, and a gateway anti-virus product, report they've had either a spyware or virus incident within the past six months.

The FaceTime study results were derived from a pair of surveys conducted between June and August, 2005 involving 622 IT managers and 564 end-users.

ClickZ Live New York What's New for 2015?
You spoke, we listened! ClickZ Live New York (Mar 30-Apr 1) is back with a brand new streamlined agenda. Don't miss the latest digital marketing tips, tricks and tools that will make you re-think your strategy and revolutionize your marketing campaigns. Super Saver Rates are available now. Register today!

ABOUT THE AUTHOR

COMMENTSCommenting policy

comments powered by Disqus

Get the ClickZ Marketing newsletter delivered to you. Subscribe today!

COMMENTS

UPCOMING EVENTS

UPCOMING TRAINING

Featured White Papers

Google My Business Listings Demystified

Google My Business Listings Demystified
To help brands control how they appear online, Google has developed a new offering: Google My Business Locations. This whitepaper helps marketers understand how to use this powerful new tool.

5 Ways to Personalize Beyond the Subject Line

5 Ways to Personalize Beyond the Subject Line
82 percent of shoppers say they would buy more items from a brand if the emails they sent were more personalized. This white paper offer five tactics that will personalize your email beyond the subject line and drive real business growth.

WEBINARS

Resources

Jobs

    • Customer Service Consultant
      Customer Service Consultant (Bonner and Partners) - Delray BeachBonner & Partners: Full-time Customer Service Consultant Position Who we are...
    • Financial Editor
      Financial Editor (Confidential) - DurhamSIX FIGURE EDITORS WANTED: To enforce lofty NEW editing standards. Easy Conditions Unlikely. Promotion and...
    • Information Processing Specialist
      Information Processing Specialist (Agora Inc. ) - BaltimoreInformation Processing Specialist – The IP specialist position ensures the successful...