Top Security Considerations for 2013

IT Security is one of those often spoken about but not always executed well topics. How aware are you of the breaches going on? Here’s a just a few from the long list for 2012:

  • Over 1,400,000 IDs were compromised in US based public health databases alone (in 2012 to date). These were linked to their social security numbers.
  • Over six million passwords were stolen in a hack of the professional networking site linkedin.com.
  • Hours ahead of its planned protest against certain incidents of internet censorship in India , hacker collective Anonymous attacked and brought down the website run by Computer Emergency Response Team India (CERT-I n), the country’s premier agency dealing with cyber security contingencies.
  • Hackers Target Police, City of Chicago Websites before the NATO summit (supposedly when security would be high!) temporarily crippling them.
  • The website of the Afghan Taliban was repeatedly taken down for the third time in less than a year crippled the main website of the Afghan Taliban, with a Taliban spokesman on Friday blaming Western intelligence agencies amid an intensifying cyber war with the insurgents. The unidentified hackers broke into the Taliban’s El Emara.

So what are we in store for in 2013? Here are the top areas to consider in IT security for 2013.

  1. The Cloud – questions of security are more complicated because of oversight and qualifications. With the Cloud being so new, assessments of providers don’t offer years of data yet.
  2. Consumerization – with many companies moving to mobile devices, the management of different security profiles, a range of levels of trust with users and devices, and a diverse set of end points is a complex and diverse task.

Source: Gartner Group report, OpenSpace.com