( http://bit.ly/2rXdb7q ) – Threats
Growing hackers exploitation with sophisticated tools that hunt for known vulnerabilities of any website.
Network of infected computer and devices
Malicious internets traffic attacks such as an HTTPS Flood and DNS Amplification DoS Attack
Solution
Automation of security products in response to changing environment
Continuous monitoring and scanning to detect security holes or issues
Deployment of Firewall to block malicious traffic
Fast removal of malware, hack repair and blacklisting by Google, Norton, and McAfee