Top IT security leaders (and one IoT hacker) reflect on this year’s biggest threats – and what to do next

Sponsored By: Softchoice

Security isn’t getting any easier. In the past year, there were more reports than ever before of businesses that were paralyzed by cyber attacks.

Softchoice interviewed top leaders in IT security to get their latest advice and published these insights in “The Ultimate Security Guide.” One overall theme that emerged is that it’s time to think differently about security. Here are some highlights from the guide.

Peek into the world of the malware economy, crypto wars, cloud security and the IoT

“The Internet of Things is wonderful, and it’s going to be a huge opportunity for us,” writes a hacker in “Letter from a Hacker: the new Frontier of IoT.  In the next 10 years, there will be more smart devices connected to the Internet than computers and mobile phones combined. But what people need to understand, says the hacker, is that the majority of IoT devices can and will get hacked. The hacker makes some straight shooting recommendations on how people should defend their devices.

Getting cloud security right

IT staff often assume that their cloud provider has taken care of all of their security needs. Many service providers offer excellent security within their own infrastructure, but when data is being transmitted to and from the cloud, it’s at risk. In “Under Pressure: The Cloud Security Burden,” Marty Ward, vice president at Sophos, identifies the four things you should know to protect your data in a cloud environment.

Ransomeware’s lucrative targets

In “The Trouble with Ransomware,” Fabian Ubogi, sales engineer at Intel Security, warns that people aren’t taking the ransomware threat seriously enough. Ransomware is designed to block access to an organization’s data until money is paid. The most lucrative and terrifying targets are often government agencies because they have outdated security technology, he says. Ubogi provides advice on what you should do to avoid your own hostage situation.

The underground threat

Similarly, the threat from malware continues to grow. In “The Vast Underground Malware Economy,” Christopher Budd, global threat communications manager at Trend Micro, describes how the attackers have become as sophisticated as the software vendors they target. Budd reveals the shocking scope of the underground threat economy and some practical ways organizations can protect themselves.

Surviving the crypto wars

Early in 2016, the FBI tried to force Apple to create software to unlock an iPhone recovered from one of the terrorist shooters in an attack in San Bernardino, California.  It was one of the latest salvos in the “crypto wars” – battles over government attempts to get access to encrypted data for law enforcement. In “Deciphering the Crypto Wars,” Kapersky Labs’ security evangelist, David Balcar advises how businesses can keep their encryption as unbreakable as possible in order to maintain consumer trust.

How to address the talent gap and the weakest link:

By 2020, the IT industry will have 1.5 million open security positions and not enough graduates to fill essential jobs. Even with current shortages, most security teams only have the power to decipher eight per cent of incoming unstructured data to protect their environments. But what if there was a technology solution that could solve this problem? In “New Tech Will Bridge the Security Talent Gap,” Willie Wong, Canadian marketing leader for security at IBM, unveils the solution.

Who is your weakest link?

Even with a robust, compliant security infrastructure in place, all it takes is to bring an organization to its knees is for one employee to click on a phishing email. Regulated organizations often rely on a check-box compliance approach to security, but they may be overlooking the fact that people are usually the weakest security link. In “What is the Greatest Security Threat to Your Healthcare Organization,” Brook Chelmo, senior marketing manager at SonicWall, provides insights on how regulated organizations can stay safe.

 

 

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Sponsored By: Softchoice

Cindy Baker
Cindy Baker
Cindy Baker has over 20 years of experience in IT-related fields in the public and private sectors, as a lawyer and strategic advisor. She is a former broadcast journalist, currently working as a consultant, freelance writer and editor.