Cloud // Cloud Storage
News
12/15/2010
04:26 PM
Alison Diana
Alison Diana
Slideshows
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Top 10 Security Stories Of 2010

As smartphones and tablets complement and battle with notebooks and PCs as routes to the connected world, as corporate users and consumers turn to both traditional Web sites and newer social networking sites to communicate, share ideas, trade business concepts, and shop, corporate IT professionals and the government organizations overseeing the nation's cybersecurity are all-too aware they must do more. And they must do it fast. Recognizing this, the federal government hopes to create a new wave
Previous
1 of 10
Next


At all-too many companies, the number of insiders may have decreased in a year that saw headcounts drop and unemployment numbers steadily rise. Those still employed may have more reasons than ever to be dissatisfied -- more hours, less pay, heavier workloads and fewer, if any, perks. As a result, businesses should remain vigilant about the ongoing likelihood of having their data or network stolen or destroyed from within. A former IT director in Virginia, for example, was sentenced to 27 months and $6,700 in restitution after pleading guilty to intentionally damaging a protected computer without authorization. Ignorant and lazy users also are to blame, especially in an era of social networking and tweeting. After all, social networking sites generally have minimal password security checks, giving determined outsiders' the ability to access the company network.

Vendors are reshaping the ways in which they work. The last 12 months saw a number of large acquisitions within the security space, and the coming months will demonstrate the success -- or failure -- of those ventures. Developers and the industry at-large also must grapple with the entire concept of updating in the case of software vulnerability; without guidelines, there's a risk it could be used, or at least be perceived as being used, as a political or competitive tool, not the customer-oriented tool it was designed as. While crystal balls generally are cloudy and difficult to read, IT security prognosticators generally are accurate: The need for security will only grow. And the challenges associated with maintaining and enhancing the safety of the corporate network will only increase.

SEE ALSO:

Internal Sabotage Security Risks Rising

Database Admin Gets 12 Months For Hacking Employer

Former IT Director Imprisoned For Hacking Employer's Servers

DARPA Developing Tech To Stop Insider Threats

25% Of Malware Spread Via USB Drives

DARPA Soliciting Bids On Insider Threat Prevention

Previous
1 of 10
Next
Comment  | 
Print  | 
More Insights
Google in the Enterprise Survey
Google in the Enterprise Survey
There's no doubt Google has made headway into businesses: Just 28 percent discourage or ban use of its productivity ­products, and 69 percent cite Google Apps' good or excellent ­mobility. But progress could still stall: 59 percent of nonusers ­distrust the security of Google's cloud. Its data privacy is an open question, and 37 percent worry about integration.
Register for InformationWeek Newsletters
White Papers
Current Issue
InformationWeek Elite 100 - 2014
Our InformationWeek Elite 100 issue -- our 26th ranking of technology innovators -- shines a spotlight on businesses that are succeeding because of their digital strategies. We take a close at look at the top five companies in this year's ranking and the eight winners of our Business Innovation awards, and offer 20 great ideas that you can use in your company. We also provide a ranked list of our Elite 100 innovators.
Video
Slideshows
Twitter Feed
Audio Interviews
Archived Audio Interviews
GE is a leader in combining connected devices and advanced analytics in pursuit of practical goals like less downtime, lower operating costs, and higher throughput. At GIO Power & Water, CIO Jim Fowler is part of the team exploring how to apply these techniques to some of the world's essential infrastructure, from power plants to water treatment systems. Join us, and bring your questions, as we talk about what's ahead.