Tuesday, September 7, 2010

Cloud Computing Will Replace Social Networks As # 2 Cyberthreat In 2 Years


Hey folks, this is serious!

C-level executives and security practitioners believe that the top three computing sources that present the greatest threat to information security today are mobile computing (69%), social networks (68%) and cloud computing platforms (35%), according to a new survey.

While 65 percent of respondents believe mobile computing will remain the top threat for the next two years, 62 percent believe that over this same two-year period cloud computing will replace social networks as the second riskiest computing environment. Furthermore, the survey revealed that respondents plan to buy more firewalls than any other primary IT security solution by the end of 2010.

The survey by FishNet Security polled IT employees from over 450 Fortune 1000 enterprises via an independent online service.


Comment from Gary Fish, CEO of FishNet Security: This survey validates that the cloud computing shift is becoming reality and that IT security departments are very concerned about the challenges it presents to the enterprise. If enterprises want to take advantage of the benefits cloud computing offers and reduce associated risks they are going to have to accelerate their cloud security policies, procedures and programs. Not surprising, the survey also reveals that securing the perimeter will continue to be a high priority and that firewalls will remain an essential part of an effective enterprise security strategy in 2010.

More survey results:

– The majority of respondents (92%) stated that the number of data breaches will increase; only 5 percent stated that the number of breaches would decrease. Three percent stated breach incidents would remain consistent. Fewer than 3 percent of respondents stated that the number of breaches would decrease but they indicated that the volume of stolen data per incident would increase
– The majority of respondents (57%) stated that theft or loss of mobile computing devices will account for the majority of data breaches. Organized cybercriminal hackers came in second at 54 percent and accidental exposure of data came in third at 52 percent
– Half of the respondents stated that the number of data breaches attributable to third-party contractors or partners would decrease
-- When asked which security service they would invest most heavily in this year, 49% stated it would be in training services
– Buying priorities for 2010 include firewalls (45%) and antivirus (39%). Authentication and anti-malware tied for third place with 31 percent.

Also, in 2010 respondents expect to see, among other things:
– Increased state-sponsored cyber espionage from countries such as China
– Customers demanding proof of improved and effective security as a
condition of doing business
– Increased numbers of untargeted, mass attacks designed to steal data

Contact: Click here.

No comments:

Post a Comment