2014 proved to be a turbulent year for the IT security industry, with the effects of data breaches being felt throughout the world. This year alone, data breaches of major companies such as Home Depot, Spotify, and eBay, were responsible for hundreds of millions of stolen records. All these attacks could only be successful because of flawed or lacking security measures.
Looking ahead to 2015, we identified some of the most prevalent causes of data breaches from the past year and compiled five trends that could remain virulent in the coming year.
1) Larger Mobile Workforce
As the number of mobile workers grows continuously, cyber attacks that specifically target mobile devices can also be expected to increase. To keep ahead of such attacks, businesses will do well to secure the process by which corporate data is transferred in and out of company infrastructures.
2) Widespread Prevalence of BYOD
A growing mobile workforce also means the increased use of company-issued and personal mobile devices. In order to protect sensitive data, businesses can be expected to ramp up security measures for data access with personal devices and to augment the mobile device management capabilities of their IT teams.
3) Consistent Business Continuity Planning
In 2014, several events highlighted the importance of creating and implementing comprehensive business continuity plans. As the reliance of business operations on technology increases, businesses will allocate more time and resources to minimizing the negative consequences of natural disasters and pandemics.
4) Increased Focus on Government IT Security
As government agencies store vast amounts of citizens’ personal data, hackers will continue to target and exploit government databases. In order to face the challenge of data governance, government agencies will increase spending on IT security with a focus on enterprise data management.
5) A Shift to Private Cloud Infrastructure
Companies of all sizes will continue moving toward cloud and hybrid cloud solutions in order to streamline processes, reduce costs, and expand IT flexibility. However, this shift will pose greater security threats. It can reasonably be expected that enterprises will adopt private cloud infrastructures – implemented within the corporate network and under the control of the IT department – to maintain control of their data.
Enterprise security data breaches affect us all. For more information on how you can protect your own data online, check out Cybercrime Prevention Tips (Part 1 and Part 2).
We hope that you and your company were not adversely affected by cyber attacks, but enjoyed a prosperous business year under the protection of extensive security measures.
At HOB, we had several reasons to celebrate in 2014:
The German Federal Office for Information Security certified HOB RD VPN, our comprehensive solution for secure remote access, according to Common Criteria EAL 4+. It ensures the security and confidentiality of your company’s information flow and enables businesses to face future challenges.
In addition to that, we celebrated HOB’s 50 anniversary and Mr Klaus Brandstätter’s 60 birthday.
Thank you very much for reading our blog in 2014, we are looking forward to writing for you again next year.
We will be out of the office until January 7 and want to take this opportunity to wish you a merry Christmas and a very happy 2015.
You must be registered in order to write comments. To register as a new user click here.
If you're already registered, please leave a comment here