Six Emerging Threats All Security Professionals Should Prepare For

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Six Emerging Threats All Security Professionals Should Prepare For-6 Next

Storing data in the cloud is probably a sensible thing for many organizations to do because most cloud providers offer better than average security, according to the report. But huge repositories of data are very attractive targets for hackers, and it's inevitable that they will come under attack increasingly often.

It's also worth mentioning that the security of cloud storage varies widely, and enterprise-class services are likely to have better encryption regimes, authorization systems and overall security than consumer-oriented services such as Dropbox and Evernote – both of which have been successfully hacked in the past.

Because cloud services are becoming less and less expensive, they are also providing a powerful tool for hackers. That's because many hackers have access to stolen credit card numbers, making it easy to set up large clusters of malicious systems to use for password cracking or other purposes.

What you can do to mitigate the threat: The best way to protect enterprise data is to ensure that it is encrypted before it is sent to the cloud using a key, which is not held by the cloud service provider. It may also be prudent to ban employees from using consumer cloud services at work – and to back this up by blocking traffic to these services at the corporate firewall.

The security threat landscape changes constantly, with malicious hackers developing new ways to compromise your systems as older vulnerabilities are discovered and patched. So it's important to be aware of the threats to enterprise security that are coming over the horizon and heading this way.

According to Paul Rubens, writing for Enterprise Security Planet, it's a question the Georgia Institute of Technology addresses in its Emerging Cyber Threat Report 2013, in which researchers identify at least six threats that all security professionals should know about.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.