Welcome!

@CloudExpo Authors: Elizabeth White, Liz McMillan, Zakia Bouachraoui, Yeshim Deniz, Pat Romanski

Related Topics: @CloudExpo, Agile Computing, Cloud Security

@CloudExpo: Blog Post

How Information Security Threats Have Evolved | @CloudExpo #Cloud #Security

Weak points we face today and how to strengthen them

Information security has become a critical priority for many businesses over the past decade, and for good reason. It seems like a new breach is exposed on nearly a daily basis, impacting another organization and its patrons. However, some companies believe that they're safe because they're either too small or too big to be affected by any of these cyberattacks. The truth is that groups of all sizes from Target to your local dentist are being hacked or having their data compromised, and it's causing a major upheaval in the security community.

Businesses tend to also think that they are more protected than they were 10 years ago due to the advancement of safeguarding solutions. However, as security testing tools have developed, so have the threats that aim to breach the cyber walls and grab your information. Let's take a look at how information security threats have evolved, what vulnerabilities we currently face and how to strengthen overall protection.

Where we were
In order to progress, it's first important to understand where we've come from in terms of threats we've once faced and what responses we've taken to mitigate these issues. When you think of offices in 2001, you likely imagine desktops, fax machines and dial-up Internet. Back then, there were 50 million Internet users, 40 million websites and 31 billion sent emails, according to a Microsoft infographic. Hackers were focused on vandalism and denial of service, committing acts mostly for fame and exposing lax security. These individuals were mostly unfunded and unorganized and didn't have a real incentive for the audience they affected.

In this type of environment, many organizations were able to quickly adapt their security strategies or throw up a stronger firewall in order to deter these threats. It was made easier by the fact that all employees traditionally worked in one office and internal IT teams managed company-owned devices. However, things didn't stay this simple, and it's because of this evolution that the security world is going through some major changes to keep up with current technology trends.

State of security now
In the past 15 years, things have developed drastically due to hardware and software

In the past 15 years, things have developed drastically due to hardware and software advancements. Currently, there are over 3 billion Internet users and approximately 1 billion websites, according to Internet Live Stats, and research from Radicati noted that there are 215.3 billion emails sent and received every day. These are obviously major increases from the 2001 numbers, and they show just how much things have changed due to Internet improvements and the proliferation of mobile devices.

Quality software can help deter current information security threats.

As the number of hardware options have changed, hackers have adapted their game to better utilize these new end points. Cyberattackers now are well-funded professionals that often aim to take your information and control your devices. Instead of aiming for a random audience as was traditional in the past, hackers are now gunning for specific targets and have a black market available to sell information. This has created a lot of problems for organizations and has lit a fire under security providers to ensure that data is protected from current and emerging threats.

Threats aren't just external
Although there are many threats that can come from outside an organization, your employees can also contribute to your potential for a data breach. In an interview with Digital Guardian, Ashley Schwartau noted that the biggest mistakes you can make are to assume that employees know your security policies and care enough to follow them. This is especially true when considering phishing attacks and the use of business-approved applications. A report from Intel found that 43 percent of data loss occurs from internal actors, splitting evenly between intentional and accidental incidents. These numbers speak volumes to how vulnerable your staff members are and how you need to train them on the best practices to avoid issues.

Software quality linked to breaches
With the threat of employees using unapproved applications, it's important for businesses to provide them with a program that will fully meet their needs and be convenient to use. If software doesn't have the features workers need to complete their daily tasks, they'll likely turn to consumer-grade applications that will not have the security capabilities your organization requires. This would leave a gaping hole in your protection strategy and give hackers an open door to your most critical data. By conducting software security testing, you can reinforce your applications while still focusing on the functionality that staff members are looking for.

It's also important to note that software in general should be thoroughly tested to ensure better quality and mitigate any actionable defects. The Online Trust Alliance found that 90 percent of breaches could have been prevented in the first half of 2014. This can be done from a combination of educating employees, enforcing password management and conducting regular app testing. Further, CAST Research Labs found a direct correlation between data breaches and poor code quality across consumer applications. By focusing on testing and using the right tools, organizations can mitigate these threats and strengthen their overall security capabilities in the process.

More Stories By Sanjay Zalavadia

As the VP of Client Service for Zephyr, Sanjay Zalavadia brings over 15 years of leadership experience in IT and Technical Support Services. Throughout his career, Sanjay has successfully established and grown premier IT and Support Services teams across multiple geographies for both large and small companies.

Most recently, he was Associate Vice President at Patni Computers (NYSE: PTI) responsible for the Telecoms IT Managed Services Practice where he established IT Operations teams supporting Virgin Mobile, ESPN Mobile, Disney Mobile and Carphone Warehouse. Prior to this Sanjay was responsible for Global Technical Support at Bay Networks, a leading routing and switching vendor, which was acquired by Nortel. He has also held management positions in Support Service organizations at start-up Silicon Valley Networks, a vendor of Test Management software, and SynOptics.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust that they are being taken care of.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to advisory roles at startups. He has worked extensively on monetization, SAAS, IoT, ecosystems, partnerships and accelerating growth in new business initiatives.
Inzata is a powerful, revolutionary data analytics platform for integrating, exploring, and analyzing data of any kind, from any source, at massive scale. Powerful AI-assisted Modeling and a patented analytics engine help users quickly load, blend and model raw and unstructured data into powerful enterprise data models, actionable real-time analytics and engaging visualizations. Go beyond spreadsheets and slides and compose a powerful narrative about how your business is performing, and how you could make it better.
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO Silicon Valley 2019 will cover all of these tools, with the most comprehensive program and with 222 rockstar speakers throughout our industry presenting 22 Keynotes and General Sessions, 250 Breakout Sessions along 10 Tracks, as well as our signature Power Panels. Our Expo Floor will bring together the leading global 200 companies throughout the world of Cloud Computing, DevOps, IoT, Smart Cities, FinTech, Digital Transformation, and all they entail. As your enterprise creates a vision and strategy that enables you to create your own unique, long-term success, learning about all the technologies involved is essential. Companies today not only form multi-cloud and hybrid cloud architectures, but create them with built-in cognitive capabilities.
Wasabi is the hot cloud storage company delivering low-cost, fast, and reliable cloud storage. Wasabi is 80% cheaper and 6x faster than Amazon S3, with 100% data immutability protection and no data egress fees. Created by Carbonite co-founders and cloud storage pioneers David Friend and Jeff Flowers, Wasabi is on a mission to commoditize the storage industry. Wasabi is a privately held company based in Boston, MA. Follow and connect with Wasabi on Twitter, Facebook, Instagram and the Wasabi blog.