Skip navigation

Mandy Hassall, Six Degrees Ltd
amanda.hassall@sixdegreespr.com
+44 1628 480280
@mandyhassall


With 2011 coming to an end, security threats show no sign of slowing down. This is according to independent information security body, the Information Security Forum <http://www.securityforum.org> (ISF).

Highlighting the main challenges for organisations in 2012, Global VP, Steve Durbin, believes: “Predicting the future of IT threats is always very difficult. Organisations can usually only deal selectively with individual aspects, but we are seeing a convergence of several major security issues that will have a significant impact in the coming months and beyond. You could argue that we are heading towards a ‘perfect storm’, where a combination of threats relating to cloud, consumerisation, cyber security and more, will come together at the same time.”

ISF’s top three security challenges for 2012:

1. Consumerisation of IT
The increasing consumerisation of IT in 2012 will create new attack vectors and potential vulnerabilities in corporate networks. The use of personal mobile devices, such as smartphones and tablets, in the workplace – blurring the lines between personal and work related activity – will continue to accelerate as cheaper, more powerful devices become available. In addition, many of the web applications used on these devices are unlikely to have undergone formal software development and testing. This could lead to potential compliance failures and disclosure of business information. Organisations should stay one step ahead about new trends, mobile devices and related security risks. ISF’s ‘Securing Consumer Devices’ report: https://www.securityforum.org/downloadresearch/publicdownloa....

2. Cyber ​​(in) security
In 2012 and beyond, organisations will be forced to address the issue of cyber security as a high priority. On the one hand, organisations want to seize the opportunities and possibilities of networked data exchange. However, this will result in them facing new risks and they will need to develop strategies and measures to protect themselves. The potential dangers of cyberspace range from industrial espionage to the violation of personal rights and the manipulation of critical national infrastructure (CNI) companies. Organisations will need to partner and collaborate with other businesses and government agencies, including their supply chain and customers, to share intelligence and influence the adoption of good cyber security practice. In January 2012, ISF will publish a new guide to strategies around cyber security.

3. Converging threats
New technologies, the use of personal devices in the workplace, digital information exchange, and working with third party suppliers and cloud providers, not only offer new avenues of attack for hackers and cyber criminals, but also they can be exploited in various ways for combining attacks. Organisations must broaden their view of potential threats and take a holistic approach to security and offer clear and up to date guidelines and training for all employees. ISF’s 2011 Standard of Good Practice offers a practical source of information security and information risk related guidance: https://www.securityforum.org/downloadresearch/publicdownloa... <https://www.securityforum.org/downloadresearch/publicdownloa...> .

Ends

About the ISF

Founded in 1989, the Information Security Forum is an independent, not-for-profit association of leading organisations from around the world. It is dedicated to investigating, clarifying and resolving key issues in information security and developing best practice methodologies, processes and solutions that meet the business needs of its Members.

ISF Members benefit from harnessing and sharing in-depth knowledge and practical experience drawn from within their organisations and developed through an extensive research and work program. The ISF provides a confidential forum and framework, which ensures that Members adopt leading-edge information security strategies and solutions. And by working together, Members avoid the major expenditure required to reach the same goals on their own.

Further information about ISF research and membership available from www.securityforum.org <http://www.securityforum.org> .

This press release was distributed by ResponseSource Press Release Wire on behalf of Six Degrees Limited in the following categories: Business & Finance, Computing & Telecoms, for more information visit https://pressreleasewire.responsesource.com/about.