Five Information Security Trends that will Dominate in 2016
- May 20, 2016
- Posted by: iNurture
- Category: Blogs
Information technology is constantly evolving. It is absolutely imperative that Information Security too evolves hand in hand. There are various dimensions to Information Security. If an organization wants to ensure Information Security then it must keep in mind all these dimensions that are the trend of the times.
Being Proactive Rather than Reactive
Companies must change their attitude of reacting after being broken into. Otherwise Information Security will remain a pipe dream. Reports reveal that 76% of the found vulnerabilities were identified more than a couple of years ago. In fact 10% were over a decade old. They are still being worked upon.
It is time to think new. It is passe to just focus on external attacks. Insiders can equally be guilty either out of malice or even simple ignorance. With the use of cloud technology for more and more services, IT department might not be able to exercise the same control. There is a possible risk of employees bypassing security protocols and systems in the process. To avoid this, IT department must have complete visibility.
Other imperatives are to continually scrutinize cloud vendors, to have clear knowledge of where data resides and to ascertain that cloud service providers meet the set security standards.
A proactive approach rather than a reactive one is the demand of the times.
Sophisticated Solutions for Sophisticated Crime
Use of malware, hacking and breaches will dominate 2016. Spear phishing and use of ransomware are the latest in cybercrime.
Ransomware can lock up the screen, encrypt files and make them inaccessible until the victim pays a ransom. Ransom may also be demanded for stolen data or by inducing fear of viruses or even threat of police action for made-up cyber violations.
Sophisticated and targeted phishing attacks are a bane for Information Security. Messages or websites with an official look try to access information by gaining trust. Another way is to hack the account of a high level officer or a CEO. This can divulge a lot of sensitive and confidential information.
Real- time monitoring and security measures, sophisticated scanning systems, blocking facilities for protection and always keeping a backup are the ways to win this battle.
Companies are also coming up with better security designed products such as Apple iPhone.
Issues Arising with IoT and BOYD
IoT (Internet of things) and BOYD (bring your own device) to work is trending. The benefits are convenience and efficiency.
But there are massive pitfalls too. The greatest security threats seem to be shifting toward the end – user level. If a person uses his own device for work but has no permanent office, how is it to be ascertained that the authorized person is using the device? It is quite possible that his device is being used by someone else. Or in another scenario, it might seem that the device being used is of the authorized person but it actually is not!
Limited and secure access, encryption of data, availability of blocking facility to enterprise network and devices when required, is a must. So is proper device management and password enforcement.
Governments Targeting Security
Governmental cyber aggression will rise in 2016. State supported hacking, targets various sectors of rival countries like defence, governance, enterprises and industries.
Besides Government’s involvement is likely to lead to the implementation of different regulations and restrictions. This might inflict unintentional collateral damage even on those uninvolved in any misdemeanor. A hostile internet is what businesses and consumers will encounter as they face both Government intervention and attack.
More money and Mastery
As criminals increase in number and skill, there is an abyss of similar talent to check them.
Information Systems Audit and Control Association (ISACA) predicts a shortage of 2 million cyber security professionals by 2019. Statistics reveal theft of one billion information records that were personally identifiable in 2014. A data breach will cost a company $150 approximately by 2020.
Chief Information Security Officers, thus, need to build a man force equipped with the talent and skill to counter attacks on Information Security. An increased budget for cyber threat intelligence is also the need of the hour.
All organizations need to be resilient, recognize the trends and develop the capability to rebuff any attack on Information Security. Regular training for security awareness will help identify and prevent attacks. Timely update of the operating system is essential. So is installing strong defences. Above all, back up data is mandatory so that files can easily be restored if an attack does take place.