The Internet of Things will soon become the biggest vector of attacks on companies, as the number of connected devices is set to reach between 20 billion and 50 billion units by 2020.
All about Virtualization and Cloud Security | Recent Articles:
The Internet of Things and quantified-self movements have led to an explosion of interesting gadgets for consumers and households, and we've detailed the types of IoT vulnerabilities and attacks in smart homes in our latest research paper. But the IoT is also laying the foundations of a new way of working. It’s about using information technology to reshape how, and where, we work.
SMBs growth by far surpasses enterprise growth, last year reaching a compound annual growth rate (CAGR) of 32% when large enterprises explored opportunities to split. Consequently, entrepreneurs have realized that it’s becoming increasingly difficult to build businesses, and that technologies can be easily incorporated.
Healthcare institutions remain among the most targeted organizations when it comes to hacker attacks and other security intrusions. These entities possess a wealth of data, including personal information that cyber criminals can use.
Cybersecurity has become a major topic of discussion for businesses and organizations of all sizes, as the number of security incidents has spiked, capturing headlines worldwide.
The shift toward using personal computing devices (laptops, tablets, smartphones and now wearables) to conduct business seems like a win-win strategy for both the enterprise and its employees. Employees work from the comfort of their own device while employers enjoy increased productivity and reduced technology costs.
The don'ts - Where companies are so far wrong:
A major shortcoming of companies of all sizes is the lack of understanding of the value of files and documents, and therefore the need to protect them. Proper precautions, then, are also lacking. So attackers can access files that should actually be stored on separate networks or separate infrastructure.
The next entry in our ongoing series covering industry-specific security issues is the education sector. Whether it’s higher education or K through 12, education has its own unique set of information security challenges and risks.
As with other industries, managed service providers (MSPs) and value-added resellers (VARs) have a great opportunity to share their expertise on security threats and solutions with clients in education. But they need to have a clear understanding of what technology and security managers in the industry are trying to achieve, and the unique hurdles facing organizations in this environment.
You can’t turn anywhere without hearing about the Internet of Things. But does all of the hullabaloo we hear about Internet connected automobiles, home thermostats, lighting, refrigerators, and even medical devices mean anything to enterprises, or is the Internet of Things (IoT) a consumer trend?
Does IoT mean anything to enterprises and their ability to produce and innovate in the years ahead? And if they embrace the IoT, what could it mean to privacy and security? It turns out that it probably means more to security than many IT and security professionals are considering.
In my previous post I raised a flag around the importance of identity and access management (IAM), and how this should be embedded in your overall security planning.
What does identity and access governance stand for?
According to Gartner, it represents "a combination of administration and account provisioning, authentication and authorization, and reporting functions" which is either served from the cloud (IDaaS) as a utility, or implemented internally in a more silo’d approach.
Companies may choose to run a combination of the two in their hybrid environment, where they bring up a secondary IAM system to handle their hosted apps, while continuing to rely on standard IAM for internal applications.
There are many questions about cloud; what is it, where is it, and who’s using it?
The answer to the last one is: “most everyone”. Analysts are a bit short on data because they too are still trying to figure-out this cloud stuff. The straightforward answer is that you are likely already using it.
Does your organization use a service provider for software-as-a-service, platform-as-a-service, or infrastructure-as-a-service? If your first answer is an absolute, “No”, you’re probably wrong.
If you’re a start-up, you’re likely using a Google or Microsoft service, perhaps a hosted customer relationship management system (Salesforce.com, for example), and myriad other cloud-based services.