Five Information security threats that need tackling
Instead of defensive methods being installed on computers, in networks, and in the cloud, there is an urgent need for enterprises to step back, take a broader look at security, and preempt steps in that direction.
“Technologies are more interconnected that has led to new types of security threats and data and privacy concerns. As new platforms gain traction and visibility at the attacker level, now is the time to examine these threats and inform organizations and individuals on how they can protect themselves,” said Vincent Weafer, Senior Vice President of McAfee Labs.
Weafer said this at the 2011 edition of McAfee Security Journal announcement. The Journal is designed to inform security executives and technical personnel on cutting-edge topics to help them make better-informed security decisions.
The five key highlights on the evolution of cyber threats and the need for a more inclusive security strategy include:
The human link: There is an ever-widening disparity between the sophistication of a network and the people who use them. Cyber criminals often use social engineering toolkits to exploit unsuspecting employees when direct attacks on an organization’s defenses fail. Educating employees on secure practices is not enough; organizations need to install the proper framework to empower and encourage employees to use these secure practices.
Mobile is everywhere: Mobile attacks are becoming increasingly sophisticated every year. Instead of rendering the device unusable, hackers are now finding ways to steal sensitive personal data to exploit. Additionally, hackers are broadening their target range to include other, more uncommon mobile systems, such as the GPS system in a car.
Cloud-based apps are on the rise: The popularity of cloud-based applications has made them an attractive target for hackers and other cyber criminals. However, the cloud is also a highly efficient way to scale security and protection for a business. Leveraged correctly, the cloud both helps reduce security costs and can actually increase overall security posture and protection.
Data is king: Whether stored on a smartphone, in the cloud, or on a network, data is what cyber criminals seek. Taking the proper precautions to secure this often ubiquitous data is a crucial step for many organizations.
Learn from previous mistakes: History is a great teacher for those who take the time to study it. Analytics help identify patterns, vulnerabilities, and even motives. Understanding any of these concepts can help prevent attacks in the future.
The seventh edition of the Journal titled Security beyond the Desktop is based on articles compiled by international experts who issue a0n urgent “call to arms” to the security industry.
- Cloud For IT Transformation: 5 Facts CIOs Should Know
- Password Protected Wi-Fi Is Also Prone To Hacks: Study
- Brands Fail To Use Customer Data to Deliver Personalization: Study
- The 10 Best Companies For Women In India
- Delving Into The ABC Of Cyber Security
- Large-Scale IoT Projects Doubled In Last One Year: Study
- Weekly Rewind: Top 10 Stories On CXOToday (Oct 9-13)
- Telecom Consolidation: Tata Tele Merges With Airtel
- Even Minor Glitches And Breaches Can Kill Brands
- Tele-Health To Bolster Home Healthcare Services