Mobile computing and BYOD construct data protection even tougher
The challenges of given conditions protection in a mobile world
New vulnerabilities
Hacktivists made sensational recent accounts headlines in 2011, but their strikes overshadowed a landlord of other break-ins including Epsilon Interactive, Silverpop, Citigroup, Honda Canada, Lush UK and Lush Australia which showed some clear trends:
Large purchaser databases are targets – millions of surreptitious records can feed future spear-phishing campaigns and departure big financial scars: the Epsilon Interactive given conditions breach alone is said to bear cost the company in billions;
Browsers are targets – browser injections, by way of exploits in software like Adobe Reader and Flash Player, are an effective avenue for malware delivery;
Users are targets – using social media to gather personal details towards spear-phishing campaigns, often used in APT-name campaigns;
Greater mobility – the steep a in routine use of smart phones and media tablets is further eroding the perimeter;
BYOD (Bring Your Own Device) - and the blurring of boundaries betwixt working and social networking are vacancy new points of exposure;
Virtualisation – Network World warns that ‘decisions to ring virtualized environments to cloud-based services likewise mean coming to grips with just discovered security considerations.'
Cloud-based services - one more moving frontier on the battlefield by cyber crime.
No comments:
Post a Comment