Softchoice

    Top IT security leaders (and one IoT hacker) reflect on this year’s biggest threats – and what to do next

    64

    Security isn’t getting any easier. In the past year, there were more reports than ever before of businesses that were paralyzed by cyber attacks.

    Softchoice interviewed top leaders in IT security to get their latest advice and published these insights in “The Ultimate Security Guide.” One overall theme that emerged is that it’s time to think differently about security. Here are some highlights from the guide.

    Peek into the world of the malware economy, crypto wars, cloud security and the IoT

    “The Internet of Things is wonderful, and it’s going to be a huge opportunity for us,” writes a hacker in “Letter from a Hacker: the new Frontier of IoT.  In the next 10 years, there will be more smart devices connected to the Internet than computers and mobile phones combined. But what people need to understand, says the hacker, is that the majority of IoT devices can and will get hacked. The hacker makes some straight shooting recommendations on how people should defend their devices.

    Getting cloud security right

    IT staff often assume that their cloud provider has taken care of all of their security needs. Many service providers offer excellent security within their own infrastructure, but when data is being transmitted to and from the cloud, it’s at risk. In “Under Pressure: The Cloud Security Burden,” Marty Ward, vice president at Sophos, identifies the four things you should know to protect your data in a cloud environment.

    Ransomeware’s lucrative targets

    In “The Trouble with Ransomware,” Fabian Ubogi, sales engineer at Intel Security, warns that people aren’t taking the ransomware threat seriously enough. Ransomware is designed to block access to an organization’s data until money is paid. The most lucrative and terrifying targets are often government agencies because they have outdated security technology, he says. Ubogi provides advice on what you should do to avoid your own hostage situation.

    The underground threat

    Similarly, the threat from malware continues to grow. In “The Vast Underground Malware Economy,” Christopher Budd, global threat communications manager at Trend Micro, describes how the attackers have become as sophisticated as the software vendors they target. Budd reveals the shocking scope of the underground threat economy and some practical ways organizations can protect themselves.

    Surviving the crypto wars

    Early in 2016, the FBI tried to force Apple to create software to unlock an iPhone recovered from one of the terrorist shooters in an attack in San Bernardino, California.  It was one of the latest salvos in the “crypto wars” – battles over government attempts to get access to encrypted data for law enforcement. In “Deciphering the Crypto Wars,” Kapersky Labs’ security evangelist, David Balcar advises how businesses can keep their encryption as unbreakable as possible in order to maintain consumer trust.

    How to address the talent gap and the weakest link:

    By 2020, the IT industry will have 1.5 million open security positions and not enough graduates to fill essential jobs. Even with current shortages, most security teams only have the power to decipher eight per cent of incoming unstructured data to protect their environments. But what if there was a technology solution that could solve this problem? In “New Tech Will Bridge the Security Talent Gap,” Willie Wong, Canadian marketing leader for security at IBM, unveils the solution.

    Who is your weakest link?

    Even with a robust, compliant security infrastructure in place, all it takes is to bring an organization to its knees is for one employee to click on a phishing email. Regulated organizations often rely on a check-box compliance approach to security, but they may be overlooking the fact that people are usually the weakest security link. In “What is the Greatest Security Threat to Your Healthcare Organization,” Brook Chelmo, senior marketing manager at SonicWall, provides insights on how regulated organizations can stay safe.

     

     

    Previous articleThe 5 biggest SAM misconceptions
    Next articleWhy McMaster is making the move to modern communications
    Cindy Baker
    Cindy Baker has over 20 years of experience in IT-related fields in the public and private sectors, as a lawyer and strategic advisor. She is a former broadcast journalist, currently working as a consultant, freelance writer and editor.

    3 COMMENTS

    1. How hot does the fire have to be before you decide to stop standing in it ?

      The Internet is completely penetrated , between the for profit pirate hackers and governemtn intelligence agencies who want to spy on every human being on the planet , you seriously need to stop putting valuable data on it.

      Yet every where I go, I hear “cloud cloud cloud” … make more stuff available for hacking , not less.

      I’m begining to think the whole planet has gone insane.

    2. contact HOMICIDEHACK@GMAIL.COM for you your credit score upgrade, grades change, server and website hack or jam, facebook and other social media hack,whatsapp and other instant messengers hack, erase criminal records, grades hack, mails hack, phone and icloud hack, credit card hack, calls and text messages hack.

    3. do you need a very good hacker, i consulted this awesome guy,when i needed someone who can hack my cheating husbands iphone and socila media account, DAMIONHACK @ GMAIL . COM easily hacked it for me, you need to contact him whenever you need a hacker. …..

    LEAVE A REPLY

    Please enter your comment!
    Please enter your name here