Ten IT Infrastructure and Security Trends for 2012 - Slide 10

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Ten IT Infrastructure and Security Trends for 2012-10 Next

A recent Symantec Critical Infrastructure Protection (CIP) Survey found that only 37 percent of companies were completely or significantly engaged in their government’s CIP programs in 2011, versus 56 percent in 2010. It should subsequently come as no surprise that overall CIP readiness on a global scale also fell an average of eight points (from 60 to 63 percent who said they are somewhat/extremely prepared in 2011 compared with 68 to 70 percent in 2010).

When combined with recent revelations around the Duqu threat, the findings of the CIP survey are particularly troubling. At this point in time, there is no reason to assume the attackers behind Duqu were unable to gather the intelligence they were looking for. Thus, it’s quite likely that 2011 saw the foundation for the next Stuxnet-like attack being laid, which may come as soon as 2012.

For many, 2011 will be recalled as the year of the data breach as companies of all sizes made headlines for losing valuable data. Small businesses were no exception as cyber criminals found SMBs as a new favorite target. Looking forward, the threat landscape won’t be getting any better but Symantec foresees 2012 as a year of action for businesses where they’ll start taking tangible steps to protect their businesses from the threats they face.

More Slideshows:

Cloud Apps: The Seven Deadly Sins Applications are the heart and soul of winning new cloud business, securing recurring revenue and ensuring customer satisfaction.

A Humorous Look at the Consumerization of IT CA Technologies' "CHIEF & CHUCK" take on the consumerization of IT.

Nine Benefits of Email Monitoring Knowing what is going on with your email communications is vital.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.