Weitere ähnliche Inhalte
Ähnlich wie Top 10 Security Trends of 2012
Ähnlich wie Top 10 Security Trends of 2012 (20)
Kürzlich hochgeladen (14)
Top 10 Security Trends of 2012
- 2. It was not business as usual in 2011. Some of the world’s
largest corporations were hacked, breached and cyber
attacked. What does this spell for 2012?
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 2
- 3. 1. More Hacking
Whether they’re bored teenagers, government spies,
corporate saboteurs or hacktivists, expect more hackers in
2012. Sadly, the vulnerabilities of 2011 are far from fixed.
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 3
- 4. 2. Human Error
How do many of these hack attacks happen? People make
mistakes. Simple as that. Click a spam email, it leads to a
Trojan horse, and there goes the network. It happens that
easily. Without proper employee training, it will continue.
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 4
- 5. 3. Data Breach Insurance
The business response to all these hacker attacks?
Minimize risk. Cyber liability policies will take off in 2012 as
the last, but necessary, line of defense.
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 5
- 6. 4. Extra Pieces of Pii
Once upon a time, personally identifiable information, or
Pii, was your Social Security number, birth date and
mother’s maiden name. Now, thanks to breaches like those
at Sony and Epsilon, the definition is expanding to include
email addresses, passwords and PINs.
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 6
- 7. 5. Privacy Planning
As the definition of privacyexpands, so will the ways
businesses handle personal information. More companies
will follow Privacy by Design, that is, build security into their
products and services at the developmental stage instead
of waiting for a government mandate.
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 7
- 8. 6. Cracking Down
The Federal Trade Commission took on Facebook in 2011
for “unfair and deceptive” handling of user information.
Look for the FTC to continue its hard stance against
companies that play fast and loose with consumer data.
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 8
- 9. 7. Redefining ‘Security’
Watch the definition of “security” change in 2012.
Government agencies, Congress, the courts and the media
all will seek to figure out what is reasonable protection
when it comes to the corporate handling of personal data.
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 9
- 10. 8. Breach Notification Laws
New breach notification laws surely will be seen in parts of
the Western Hemisphere this year. Germany passed a law
requiring breach notification in 2010, and many of
Germany’s neighbors are considering it, as is Canada. But
what about the U.S.? Unlikely.
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 10
- 11. 9. Cloud Security Concerns
As more computers, devices and users migrate to the
cloud–storing files and running applications on the web–
expect more talk of cloud security. Especially since the
cloud isn’t governed by the outdated Electronic
Communications Privacy Act, which establishes what kind
of information government and police agencies can access,
and how.
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 11
- 12. 10. Social Media Attacks
Social media accounts are as vulnerable as the cloud. Just
ask Lady Gaga, whose little monsters were recently duped
into signing up for a Gaga edition iPad. The rub: Information
simply went to a social-media-savvy conman. We’ll see more
attacks on individual and corporate social media accounts,
for sure.
January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 12