Sunday, February 19, 2012

A Look at Trends in Data Security for 2012: The Risks

By Oliver David


2011 was really a year of headlines for information breaches all through the globe. There were attacks by hackers who believed in a cause, such as the group Anonymous, there were state-sponsored strikes by groups that penetrated other govt security networks and there were criminal hackers who targeted their work on discovering simple targets in small and medium-sized companies. Therefore the road for 2012 appears to be paved for much more attacks as well as an increase in information insecurity.

Here are a few trends to think about and review as the year rolls on. One thing is certain, the increase in data breaches has been on the rise over the past 10 years.

Both because of a continuously growing digital economy and also the improve of mobile devices like laptops, smartphones now tablets. And the wake-up call came in a variety of ways this year, with 1 in the greatest that was when Google removed 22 Android apps because of fraud. Criminal hackers are concentrating on mobile devices simply because they're much more vulnerable and simply because they include a vast quantity of individual and monetary data and info. Using the recent news of an additional version in the well-liked iPad, you are able to see that that the pace of purchasing and making use of mobile devices will outpace any attempts to make them more secure. This really is a security headache about to occur in 2012.

Another trend for 2012 will be more big data thefts and unfortunately more small-businesses will be victims of data thefts as well. In 2011, three data breaches were of such scale that they were placed in the Top 10 largest hack incidents of all time. Whether it is simple mistakes like a lost company mobile phone, a third party intrusion or an actual criminal attack, the big data thefts are most likely being planned or possibly already underway. Smaller businesses will become victims at a higher rate due to their vulnerabilities, either lacking adequate controls or no controls at all. And if a company that has 10,000 email accounts is hacked and those email accounts are hacked, the proliferation could be great.

All businesses and organizations ought to come to the realization that a pricey information breach isn't an issue of if, but instead when. Then taking adequate actions to shield and stop information will put the business within the driver seat instead of as a passenger of some hacks malicious fast moving vehicle. Using usb encryption is a great way to avoid data breaches.




About the Author:



No comments: