Is data protection really possible in a mobile world?

Mobile computing and BYOD construct data protection even tougher

The challenges of given conditions protection in a mobile world

New vulnerabilities

Hacktivists made sensational recent accounts headlines in 2011, but their strikes overshadowed a landlord of other break-ins including Epsilon Interactive, Silverpop, Citigroup, Honda Canada, Lush UK and Lush Australia which showed some clear trends:

Large purchaser databases are targets – millions of surreptitious records can feed future spear-phishing campaigns and departure big financial scars: the Epsilon Interactive given conditions breach alone is said to bear cost the company in billions;

Browsers are targets – browser injections, by way of exploits in software like Adobe Reader and Flash Player, are an effective avenue for malware delivery;

Users are targets – using social media to gather personal details towards spear-phishing campaigns, often used in APT-name campaigns;

Greater mobility – the steep a in routine use of smart phones and media tablets is further eroding the perimeter;

BYOD (Bring Your Own Device) - and the blurring of boundaries betwixt working and social networking are vacancy new points of exposure;

Virtualisation – Network World warns that ‘decisions to ring virtualized environments to cloud-based services likewise mean coming to grips with just discovered security considerations.'

Cloud-based services - one more moving frontier on the battlefield by cyber crime.

No comments:

Post a Comment