Thursday, April 9, 2009

10 Security Threats to Watch Out for in 2009

10 Security Threats to Watch Out for in 2009

There are some security threats that have been around long before the advent of the Internet, and even some Internet threats have been around for a while. Still, according to one analyst, attackers are becoming more sophisticated in circumventing our security controls, and new threats are starting to emerge.

In an article on the TechRepublic website, analyst Debra Littlejohn Shinder outlines the 10 security threats she sees as growing in prominence this year. They include:

  • Social networking: It’s finding its way into the workplace, Shinder says, and too many people “let their hair down when posting on these sites and share much more personal data (and even company data) than they should.”
  • More attacks on the integrity of the data: It used to be attackers were just looking for a free ride on your Internet connection, but now data is quickly becoming the target.
  • Attacks on mobile devices: Laptops, smart phones and new technology carry around more sensitive data than ever — and most people don’t take the proper corrective measures.
  • Virtualization: Shinder says virtualized environments are becoming commonplace in the business world, and, if it’s “properly deployed, virtualization can even increase security — but that’s a big ‘if,’” she says. “Virtualization makes security more complicated because it introduces another layer that must be secured.”
  • Cloud computing: “Cloud advocates envision a day when we’ll all use inexpensive terminals to access our resources that are located someplace ‘out there,’” Shinder says. “But when your data is ‘out there,’ how can you be sure that it’s protected from everyone else ‘out there?’”

Some of the other threats Shinder sees include more attacks on non-Windows operating system, increased vulnerability of third party applications, increased recycling of computer components, IP convergence and people simply being too overconfident in their existing security controls.

To read the full article, click here: