
{"id":2712,"date":"2013-11-06T00:00:00","date_gmt":"2013-11-06T00:00:00","guid":{"rendered":"http:\/\/otava.test\/2013-server-security-malware-vms-compliance\/"},"modified":"2013-11-06T00:00:00","modified_gmt":"2013-11-06T00:00:00","slug":"2013-server-security-malware-vms-compliance","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/","title":{"rendered":"2013 Server Security: Malware, VMs &#038; Compliance"},"content":{"rendered":"<p dir=\"ltr\">According to the <em>2013 Bit9 Server Security Survey Report<\/em>, 55 percent of IT and security professionals\u2019 top server security concerns include targeted attacks and data breaches on their servers. Another 26 percent report they have been hit by advanced malware, up from 2011 when only 17 percent reported the same. When it comes to which kind of servers pose the highest risk, 52 percent said web servers, with file servers and email servers trailing behind at 12 and 11 percent, respectively.<\/p>\n<figure id=\"attachment_14219\" aria-describedby=\"caption-attachment-14219\" style=\"width: 601px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-14219 \" title=\"Servers with Highest Risk by Type\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png\" alt=\"Servers with Highest Risk by Type\" width=\"601\" height=\"330\" \/><figcaption id=\"caption-attachment-14219\" class=\"wp-caption-text\">Servers with Highest Risk by Type; Source: Bit9<\/figcaption><\/figure>\n<p dir=\"ltr\">When it came to server security solutions, 98 percent were running <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">antivirus<\/a>, and 48 percent were had <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">file integrity monitoring<\/a> deployed. Another security software that can help protect web servers, voted to be at highest risk, is a <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">web application firewall<\/a>. Sitting behind your virtual or dedicated firewall, a WAF can protect web servers and databases from malicious online attacks by scanning incoming traffic to web servers for any malicious attacks that may affect the web application server. A WAF uses dynamic profiling to learn what kind of traffic and users are normal, and what could potentially be malicious traffic.<\/p>\n<p dir=\"ltr\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"Web Application Firewall\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/waf-diagram.png\" alt=\"Web Application Firewall\" width=\"600\" height=\"325\" \/><\/p>\n<p dir=\"ltr\">When it came to managing virtual servers, 59 percent of security professionals also viewed operational VM management, access control, and auditing as their top concerns. If outsourcing your virtual servers, a <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/private-cloud\/\">private cloud solution<\/a> may give you the option of direct access to your own VM operations management console, ensuring you have complete control of your server environment.<\/p>\n<p dir=\"ltr\">Only 17 percent of respondents were concerned with meeting and maintaining compliance requirements, which may just be a reflection of the sample size and type of industries the respondents represented. While compliance is not security, many requirements under data regulatory standards do their part to ensure security on different levels. Encryption is a best practice among those that need to meet <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a>, <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI DSS<\/a>, <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/soc-1-2-3-compliant-cloud\/\">SOX<\/a> and other compliance standards.<\/p>\n<p>Related Articles:<br \/>\n<em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/\">Avoiding a High Profile Breach with Preventative IT<\/a><\/em><br \/>\nThe Adobe hack originally reported earlier this month turns out to have affected 38 million total users, including financial and personal account data. Adobe claims the 2.9 initially reported had their credit cardholder data compromised, while the additional millions had \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/avoiding-a-high-profile-breach-with-preventative-it\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/demand-for-cloud-security-increases-as-ddos-attacks-increase-54-in-q2\/\">Demand for Cloud Security Increases as DDoS Attacks Increase 54% in Q2<\/a><\/em><br \/>\nCloud-based security revenue is forecasted to reach $9.2 billion by 2017, at a CAGR (compound annual growth rate) of 10.8 percent. In addition, the managed security market is projected to grow 45 percent. According to FierceTelecom.com, the significant growth can \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/demand-for-cloud-security-increases-as-ddos-attacks-increase-54-in-q2\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-cost-of-data-breaches-increases-by-78-percent\/\">2013 Cost of Data Breaches Increases by 78 Percent<\/a><\/em><br \/>\nAccording to the 2013 Cost of a Cybercrime Study conducted by the Ponemon Institute and Hewlett-Packard, the cost of cybercrime has increased 78 percent since the first study was conducted four years ago. The cost to enterprises to pay to \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-cost-of-data-breaches-increases-by-78-percent\/\">Continue reading \u2192<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.bit9.com\/download\/reports\/2013-Server-Security-Survey-Report-FNL.pdf\">2013 Bit9 Server Security Survey Report<\/a> (PDF)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the 2013 Bit9 Server Security Survey Report, 55 percent of IT and security professionals\u2019 top server security concerns include targeted attacks and data breaches on their servers. Another 26 percent report they have been hit by advanced malware, up from 2011 when only 17 percent reported the same. When it comes to which kind of servers pose the highest risk, 52 percent said web servers, with file servers and email servers trailing behind at 12 and 11 percent, respectively. When it came to server security solutions, 98 percent were running antivirus, and 48 percent were had file integrity monitoring deployed. Another security software that can help protect web servers, voted to be at highest risk, is a web application firewall. Sitting behind your virtual or dedicated firewall, a WAF can protect web servers and databases from malicious online attacks by scanning incoming traffic to web servers for any malicious attacks that may affect the web application server. A WAF uses dynamic profiling to learn what kind of traffic and users are normal, and what could potentially be malicious traffic. When it came to managing virtual servers, 59 percent of security professionals also viewed operational VM management, access control,&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2712","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>2013 Server Security: Malware, VMs &amp; Compliance | OTAVA<\/title>\n<meta name=\"description\" content=\"55 percent of IT and security professionals\u2019 top server security concerns include targeted attacks and data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2013 Server Security: Malware, VMs &amp; Compliance\" \/>\n<meta property=\"og:description\" content=\"55 percent of IT and security professionals\u2019 top server security concerns include targeted attacks and data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-11-06T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"2013 Server Security: Malware, VMs &#038; Compliance\",\"datePublished\":\"2013-11-06T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/\"},\"wordCount\":470,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/\",\"url\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/\",\"name\":\"2013 Server Security: Malware, VMs & Compliance | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png\",\"datePublished\":\"2013-11-06T00:00:00+00:00\",\"description\":\"55 percent of IT and security professionals\u2019 top server security concerns include targeted attacks and data breaches.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2013 Server Security: Malware, VMs &#038; Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"2013 Server Security: Malware, VMs & Compliance | OTAVA","description":"55 percent of IT and security professionals\u2019 top server security concerns include targeted attacks and data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/","og_locale":"en_US","og_type":"article","og_title":"2013 Server Security: Malware, VMs & Compliance","og_description":"55 percent of IT and security professionals\u2019 top server security concerns include targeted attacks and data breaches.","og_url":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/","og_site_name":"OTAVA","article_published_time":"2013-11-06T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"2013 Server Security: Malware, VMs &#038; Compliance","datePublished":"2013-11-06T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/"},"wordCount":470,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/","url":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/","name":"2013 Server Security: Malware, VMs & Compliance | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png","datePublished":"2013-11-06T00:00:00+00:00","description":"55 percent of IT and security professionals\u2019 top server security concerns include targeted attacks and data breaches.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/Servers-with-Highest-Risk-by-Type.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/2013-server-security-malware-vms-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"2013 Server Security: Malware, VMs &#038; Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2712","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2712"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2712\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2712"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2712"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2712"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}