TechTarget

Expect highly targeted cyber attacks with inside help in 2010, businesses warned

Businesses face an increasing number of threats from cybercriminals, according to the latest internet security report by IT management software company

Businesses face an increasing number of threats from cybercriminals, according to the latest internet security report by IT management software company CA.

In light of this growing risk, CA said the majority of businesses still do not have adequate security in place, rendering them vulnerable to attack.

Rogue or fake security software, major search engines, social networks and Web 2.0 threats were the most notable online threats in 2009, the report said.

Most of these trends are expected to continue in 2010, but cybercriminals will not only exploit social networks and the cloud, they also will look for easier ways to steal information, the report said.

This will include hiring "moles" or spies to pinpoint weaknesses within businesses and using employees or former employees willing to siphon out data for a profit.

Employees are one of the biggest threats, as the poor economic climate could lead to misuse of company data for personal gain, the report said.

"Businesses are at threat from all angles," said Joseph Souren, Emea vice-president for CA's internet security business unit.

Businesses are at risk every time their employees use search engines, e-mail and social networking, in addition to external and internal scams, data loss and theft, he said.

"Businesses that fall victim to cybercrime not only face costs associated with repairing systems hit by attacks, but also in lost productivity from disruption," said Souren.

Cybercrime and fraud cost UK small businesses an average of £800 each last year, equating to a loss of more than £3.84bn, according to the Federation of Small Businesses Report 2009.

 

CA internet security predictions for 2010 
 
  • Cybercriminals are becoming increasingly invisible as they work to remain under the radar
  • Poor economic conditions will drive the internal threat even higher
  • Data leakage prevention will become more identity centric
  • Cybercriminals are increasingly likely to target mobile devices to steal information
  • Cloud agreements will become more detailed to protect data owners

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close