The 8 Biggest Security Threats for 2010 - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next 6. Trust: The biggest threat to enterprise security-7 Next

6. Trust: The biggest threat to enterprise security

While weak passwords and careless users are always a security risk, new Web-based threats exploit human behavior on a whole new level by tapping into trusted Web sites and applications. In networks like Twitter and Facebook, users build online relationships with people they know and invite into their circle. Cybercriminals hack into these trusted relationships through stolen log-ins and prey on unsuspecting users. Given the success of fake antivirus and fake codec attacks - each of which was highly suspicious to anyone paying attention - attacks that exploit user trust will be far more difficult to detect. These types of attacks will undoubtedly present one of the biggest challenges for enterprise security managers in 2010.

Blue Coat Systems has released a comprehensive list review of security for 2009, and included in the mix are its predictions for the biggest security threats for the coming year.

Among the more notable trends Blue Coat cites:

  • As e-mail continues to get more secure, the bad guys will shift increasingly to social media and even smartphones as their attack vectors of choice.
  • Multi-relay attacks will continue to grow in prevalence.
  • Mobile workers will still be the most vulnerable to attack.

Click through this slideshow for even more information on Blue Coat's predictions for 2010.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.