The lists will soon be pouring in from experts around the globe for the hot new trends in everything from social media to fashion to home décor. And where do most get their information when it comes to these trends?
The Internet.
So it seems fitting to have an equally great list about cyber security. The fact of the matter is, cyber security is something that continues to evolve as more and more of us depend on not just the Internet, but also our mobile devices and cloud integration.
Here are our predictions for the top 5 trends in cyber security for 2013:
Enterprise mobility
Employees are looking for mobile work conditions where BYOD is the name of the game. In fact, according to Lumension, 90% of organizations are planning to offer BYOD by 2014. Alarmingly, however, only 20% of these organizations have policies in place to deal with security issues that will definitely come from the BYOD craze.
Sharing information across multiple devices—personal and otherwise—may increase productivity but it can be a nightmare for your security team. Cyber security professionals will want to explore new answers for the risks that are surely due to pop up as organizations give their employees more “free reign” when it comes to connectivity and information.
Mobile enterprise
See what we did there? If enterprise mobility is on the list, you can bet that mobile enterprise is equally listed as a trend to take note of. Organizations are making it easier for clients, customers—even employees—to use mobile payment options, access financial accounts and log in to CRM systems. It’s imperitive that your security team develops comprehensive security parameters around any mobile enterprise applications you’re offering to your constituents.
Cloud. Period.
The cloud is everywhere—that’s the point, right? In 2013, cyber security professionals must take careful note as applications and data move to being stored in the cloud rather than desktops at a rapid pace. Security policies and procedures must be thought-out and communication between all organization teams is of utmost importance as these shifts are made. It will be a series of continuous monitoring and evaluation.
“Everything” consolidation mode
It’s not just apples-to-apples data consolidation anymore (was it ever, really?) Now, we’re looking at historic levels of data consolidation along with centralized infrastructures and even organizations’ branch offices consolidation. No matter the type of consolidation, thinking at a level of “security first” is going to be essential in 2013. An acute awareness of where networks and servers are, along with an understanding of parameters around data center intake capabilities will also be paramount next year.
Malware mutation and education
Lumension stated in a recent video chat that there are nearly 80 million components of malware. In the same vein, it is not the malware of yore. Malware is a constant evolution and mutates at a frequency that makes it hard for researchers to keep up. This will not cease in 2013. As a result, cyber security professionals will need to educate users around the assumption that signature anti-virus software will protect them from the new breed of malware—it won’t. In fact, Paul Hentry, a security and forensics analyst at Lumension, reported that malware infects 30% of computers in the U.S. (second only to South Korea). This number will be sure to increase if malware isn’t seen in a new light with new protection perspectives next year.
And although it may not fit into the “trend” category for 2013, surely data leaks and breaches will continue. Professionals should be quick to develop policies and strong encryption protocol for any and all information stored online.
Some may say that we’re making it too easy, that static defenses for what will be in 2013 will not be enough to correct the pending problems. Dynamic policies and solutions are key.
What do you think? Are there others that should be on the list? What do you see as being a changing cyber security trend for 2013?
The nuiances between the “Mobile Enterprise” and “Enterprise Mobility” are interesting, to say the least! As time moves on, the distinction between these two concepts will become mute, however along the way, the basic tenants of cyber security will HAVE to change to accomodate the drive to have data anywhere at anytime. We the customers will drive us the enterprises to deliver this level of service and if we the enterprise don’t deliver it, our competitors more than likely will.