dcsimg

Top Seven Internet Security Trends

  • Top Seven Internet Security Trends-

    From Epsilon to RSA Security SecurID to Sony, IID has witnessed criminals concentrating on organizations that house proprietary data for millions of customers. In each case, cyber criminals targeted and attacked these organizations in particular in order to gain access to vital personal information (like email addresses, shopping habits, etc.) that could lead to broader consumer and employee attacks (better known as spear phishing). IID estimates that by the number of reported events, 2011 was likely the worst year ever for data breach incidents, and the forecast does not look any better for 2012.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9

Top Seven Internet Security Trends

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
  • Top Seven Internet Security Trends-2

    From Epsilon to RSA Security SecurID to Sony, IID has witnessed criminals concentrating on organizations that house proprietary data for millions of customers. In each case, cyber criminals targeted and attacked these organizations in particular in order to gain access to vital personal information (like email addresses, shopping habits, etc.) that could lead to broader consumer and employee attacks (better known as spear phishing). IID estimates that by the number of reported events, 2011 was likely the worst year ever for data breach incidents, and the forecast does not look any better for 2012.

IID (Internet Identity®), a provider of technology and services that help organizations secure their Internet presence, recently released its list of the top security trends from 2011. Some specific trends that IID saw emerge over the past year include the extended enterprise coming under assault, the emergence of dangerous mobile applications, and cyber criminals increasingly harnessing the power of social media. This slideshow highlights IID's list of the top Internet security incidents and trends from 2011 (in no particular order).

More Slideshows:


Consumers' Increasing Reliance on Facebook and Other Social TrendsNew figures reveal rapid adoption of social media in consumer shopping behaviors.

Five Key Areas to Consider When Implementing Real-Time Processing There are many opportunities to better leverage existing data assets and services in a larger ecosystem by providing real-time access through APIs.

Top Predictions for IT Organizations and Users for 2012 and Beyond Simple but powerful email campaign ideas to build loyalty with customers. Predictions show IT budgets are moving out of the control of IT departments.