Top 10 Security Stories Of 2010 Slideshow
As smartphones and tablets complement and battle with notebooks and PCs as routes to the connected world, as corporate users and consumers turn to both traditional Web sites and newer social networking sites to communicate, share ideas, trade business concepts, and shop, corporate IT professionals and the government organizations overseeing the nation's cybersecurity are all-too aware they must do more. And they must do it fast. Recognizing this, the federal government hopes to create a new wave
December 15, 2010
At all-too many companies, the number of insiders may have decreased in a year that saw headcounts drop and unemployment numbers steadily rise. Those still employed may have more reasons than ever to be dissatisfied -- more hours, less pay, heavier workloads and fewer, if any, perks. As a result, businesses should remain vigilant about the ongoing likelihood of having their data or network stolen or destroyed from within. A former IT director in Virginia, for example, was sentenced to 27 months and $6,700 in restitution after pleading guilty to intentionally damaging a protected computer without authorization. Ignorant and lazy users also are to blame, especially in an era of social networking and tweeting. After all, social networking sites generally have minimal password security checks, giving determined outsiders' the ability to access the company network.
Vendors are reshaping the ways in which they work. The last 12 months saw a number of large acquisitions within the security space, and the coming months will demonstrate the success -- or failure -- of those ventures. Developers and the industry at-large also must grapple with the entire concept of updating in the case of software vulnerability; without guidelines, there's a risk it could be used, or at least be perceived as being used, as a political or competitive tool, not the customer-oriented tool it was designed as. While crystal balls generally are cloudy and difficult to read, IT security prognosticators generally are accurate: The need for security will only grow. And the challenges associated with maintaining and enhancing the safety of the corporate network will only increase.
SEE ALSO:
Internal Sabotage Security Risks Rising
Database Admin Gets 12 Months For Hacking Employer
Former IT Director Imprisoned For Hacking Employer's Servers
DARPA Developing Tech To Stop Insider Threats
About the Author
You May Also Like