Ten IT Infrastructure and Security Trends for 2012 - Slide 10

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Ten IT Infrastructure and Security Trends for 2012-10 Next

A recent Symantec Critical Infrastructure Protection (CIP) Survey found that only 37 percent of companies were completely or significantly engaged in their government’s CIP programs in 2011, versus 56 percent in 2010. It should subsequently come as no surprise that overall CIP readiness on a global scale also fell an average of eight points (from 60 to 63 percent who said they are somewhat/extremely prepared in 2011 compared with 68 to 70 percent in 2010).

When combined with recent revelations around the Duqu threat, the findings of the CIP survey are particularly troubling. At this point in time, there is no reason to assume the attackers behind Duqu were unable to gather the intelligence they were looking for. Thus, it’s quite likely that 2011 saw the foundation for the next Stuxnet-like attack being laid, which may come as soon as 2012.

For many, 2011 will be recalled as the year of the data breach as companies of all sizes made headlines for losing valuable data. Small businesses were no exception as cyber criminals found SMBs as a new favorite target. Looking forward, the threat landscape won’t be getting any better but Symantec foresees 2012 as a year of action for businesses where they’ll start taking tangible steps to protect their businesses from the threats they face.

More Slideshows:


Cloud Apps: The Seven Deadly Sins Applications are the heart and soul of winning new cloud business, securing recurring revenue and ensuring customer satisfaction.

A Humorous Look at the Consumerization of IT CA Technologies' "CHIEF & CHUCK" take on the consumerization of IT.

Nine Benefits of Email Monitoring Knowing what is going on with your email communications is vital.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.