In the wake of rising threats, it is
important for everyone to be geared with new cyber challenges that would arise
in the New Year. McAfee predicts the cyber challenges:
1. Targeted Attacks:
In 2013, we are likely to see
significantly more targeted attacks and targeted malware. Protecting against
this will be a major challenge- particular for enterprise and government;
2. Signed Malware:
Signed malware was prevalent in 2012
and this is likely to continue. There will be a large increase in this type of
threat and it will be harder to stop because it appears more legitimate;
3. Big Business at Risk:
Enterprises can be at a higher risk
of an attack as there is often a greater attack surface and move ‘visibility
gaps’ in their security posture;
4. Non-Windows Attack:
We suspect non-windows attack will
continue to increase in 2013. Enterprises, particularly those embracing Bring
Your Own Device (BODY), are also at risk;
5. Ransomware:
This will also be prevalent in 2013.
Ransomware is operated by encrypting files on a victim’s computer, which can
only be unlocked by paying the criminals a ‘fine’. It has been a big issue in
other countries around the world in the past;
6. Impact of Changing Regulation:
Financial services organizations in India
will need to demonstrate compliance with RBI regulatory mandates, which include
data protection, event collection and analysis, endpoint controls, and related
security measures.
7. Need for Incident Response:
Organizations will have to review
their processes for dealing with a targeted attack;
8. Security Process Automation:
With an increasing number, and
complexity of the threats faced by organizations, many security technologies
still require significant hands-on management;
9. Connected Devices:
The growth in number and variety of
new connected devices will provide additional gateways for hackers to access
personal or business networks- these ‘connected devices’ include connected
homes and connected cars;
10.
Bring
Your Own Application:
IT administrators are losing control
of what tools and applications are used inside the enterprise and business
users (often lacking in an understanding of the potential security risks these application
can pose).
No comments:
Post a Comment