Five Security Predictions for 2011 - Slide 2

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Security Predictions for 2011-2 Next

Securing mobile devices and other smartphones will become an increased priority, especially as more and more employees attempt to access corporate networks with their own personal mobile devices.

Attacks on critical infrastructures, such as electric grids, water systems, etc. will become top targets for cyber criminals looking to make a big impact with little effort. As the threat landscape becomes more sophisticated, cyber criminals aren't just looking to attack or steal data, but are setting their sights on critical infrastructures to cause harm.

While security is always on the minds of IT professionals to one degree or another, the folks at IBM think that 2011 will bring some fundamental changes to the way IT organizations think about and mange security.

Here’s a list of five security predictions for 2011 that promise to change the strategic role IT security plays in your organization.

More Slideshows:

Workforce Challenges in 2011 Despite the improving economy, we'll continue to struggle with difficult workforce challenges in 2011.

Top Outsourcing Trends for Q3 2010 The latest outsourcing trends identified by the Everest Group.

Five Innovations that Could Change the Way We Live, Work and Play IBM predicts five ways that technology innovations will change people's lives.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.