Zeeshan Mir Baz has collected the information from the website:https://scsonline.georgetown.edu/programs/masters-technology-management/resources/top-threats-to-information-technology in the article said that:

Modern technology and society’s constant connection to the Internet
allows more creativity in business than ever before – including the
black market. Cybercriminals are carefully discovering new ways to tap
the most sensitive networks in the world. Protecting business data is a
growing challenge but awareness is the first step. Here are the top 10
threats to information security today:
Technology with Weak Security
– New technology is being released every day. More times than not, new
gadgets have some form of Internet access but no plan for security. This
presents a very serious risk – each unsecured connection means
vulnerability. The rapid development of technology is a testament to
innovators, however security lags severely
1.
Social Media Attacks – Cybercriminals are leveraging social media as a medium to distribute a complex geographical attack called “
water holing”. The attackers identify and infect a cluster of websites they believe members of the targeted organization will visit
2.
Mobile Malware
– Security experts have seen risk in mobile device security since the
early stages of their connectivity to the Internet. The minimal mobile
foul play among the long list of recent attacks has users far less
concerned than they should be. Considering our culture’s unbreakable
reliance on cell phones and how little cybercriminals have targeted
them, it creates a catastrophic threat.
Third-party Entry
– Cybercriminals prefer the path of least resistance. Target is the
poster child of a major network attack through third-party entry points.
The global retailer’s HVAC vendor was the unfortunate contractor whose
credentials were stolen and used to steal financial data sets for 70
million customers
3.
Neglecting Proper Configuration
– Big data tools come with the ability to be customized to fit an
organization’s needs. Companies continue to neglect the importance of
properly configuring security settings. The New York Times recently fell
victim to a data breach as a result of enabling only one of the several
critical functionalities needed to fully protect the organization’s
information
4.
Outdated Security Software
– Updating security software is a basic technology management practice
and a mandatory step to protecting big data. Software is developed to
defend against known threats. That means any new malicious code that
hits an outdated version of security software will go undetected.
Social Engineering
– Cybercriminals know intrusion techniques have a shelf life. They have
turned to reliable non-technical methods like social engineering, which
rely on social interaction and psychological manipulation to gain
access to confidential data. This form of intrusion is unpredictable and
effective.
Lack of Encryption – Protecting
sensitive business data in transit and at rest is a measure few
industries have yet to embrace, despite its effectiveness. The health
care industry handles extremely sensitive data and understands the
gravity of losing it – which is why HIPAA compliance requires every
computer to be encrypted.
Corporate Data on Personal Devices
– Whether an organization distributes corporate phones or not,
confidential data is still being accessed on personal devices. Mobile
management tools exist to limit functionality but securing the loopholes
has not made it to the priority list for many organizations.
Inadequate Security Technology – Investing in
software that monitors the security of a network has become a growing
trend in the enterprise space after 2014’s painful rip of data breaches.
The software is designed to send alerts when intrusion attempts occur,
however the alerts are only valuable if someone is available to address
them. Companies are relying too heavily on technology to fully protect
against attack when it is meant to be a managed tool.
To learn more about Georgetown University’s online Master’s in Technology Management program,
request more information or contact an admissions representative at (202) 687-8888.
Sources
1Ten
Napel, Novealthy, Mano. "Wearables and Quantified Self Demand
Security-First Design." Wired.com. Conde Nast Digital, 2015. Web. 12
Sept. 2015.
2Sterling, Bruce. "Spear-phishing and Water-holing." Wired.com. Conde Nast Digital, 10 Oct. 2012. Web. 12 Sept. 2015.
3Krebs, Brian. "The Target Breach, By the Numbers." Krebs on Security RSS. Krebs on Security, 14 May 2014. Web. 12 Sept. 2015.
4"Cybersecurity Lessons from the New York Times Security Breach." GovDefenders. DLT Solutions, 2013. Web. 12 Sept. 2015.
Comments
Post a Comment