Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
How Information Security Threats Have Evolved | @CloudExpo #Cloud #Security
Weak points we face today and how to strengthen them

Information security has become a critical priority for many businesses over the past decade, and for good reason. It seems like a new breach is exposed on nearly a daily basis, impacting another organization and its patrons. However, some companies believe that they're safe because they're either too small or too big to be affected by any of these cyberattacks. The truth is that groups of all sizes from Target to your local dentist are being hacked or having their data compromised, and it's causing a major upheaval in the security community.

Businesses tend to also think that they are more protected than they were 10 years ago due to the advancement of safeguarding solutions. However, as security testing tools have developed, so have the threats that aim to breach the cyber walls and grab your information. Let's take a look at how information security threats have evolved, what vulnerabilities we currently face and how to strengthen overall protection.

Where we were
In order to progress, it's first important to understand where we've come from in terms of threats we've once faced and what responses we've taken to mitigate these issues. When you think of offices in 2001, you likely imagine desktops, fax machines and dial-up Internet. Back then, there were 50 million Internet users, 40 million websites and 31 billion sent emails, according to a Microsoft infographic. Hackers were focused on vandalism and denial of service, committing acts mostly for fame and exposing lax security. These individuals were mostly unfunded and unorganized and didn't have a real incentive for the audience they affected.

In this type of environment, many organizations were able to quickly adapt their security strategies or throw up a stronger firewall in order to deter these threats. It was made easier by the fact that all employees traditionally worked in one office and internal IT teams managed company-owned devices. However, things didn't stay this simple, and it's because of this evolution that the security world is going through some major changes to keep up with current technology trends.

State of security now
In the past 15 years, things have developed drastically due to hardware and software

In the past 15 years, things have developed drastically due to hardware and software advancements. Currently, there are over 3 billion Internet users and approximately 1 billion websites, according to Internet Live Stats, and research from Radicati noted that there are 215.3 billion emails sent and received every day. These are obviously major increases from the 2001 numbers, and they show just how much things have changed due to Internet improvements and the proliferation of mobile devices.

Quality software can help deter current information security threats.

As the number of hardware options have changed, hackers have adapted their game to better utilize these new end points. Cyberattackers now are well-funded professionals that often aim to take your information and control your devices. Instead of aiming for a random audience as was traditional in the past, hackers are now gunning for specific targets and have a black market available to sell information. This has created a lot of problems for organizations and has lit a fire under security providers to ensure that data is protected from current and emerging threats.

Threats aren't just external
Although there are many threats that can come from outside an organization, your employees can also contribute to your potential for a data breach. In an interview with Digital Guardian, Ashley Schwartau noted that the biggest mistakes you can make are to assume that employees know your security policies and care enough to follow them. This is especially true when considering phishing attacks and the use of business-approved applications. A report from Intel found that 43 percent of data loss occurs from internal actors, splitting evenly between intentional and accidental incidents. These numbers speak volumes to how vulnerable your staff members are and how you need to train them on the best practices to avoid issues.

Software quality linked to breaches
With the threat of employees using unapproved applications, it's important for businesses to provide them with a program that will fully meet their needs and be convenient to use. If software doesn't have the features workers need to complete their daily tasks, they'll likely turn to consumer-grade applications that will not have the security capabilities your organization requires. This would leave a gaping hole in your protection strategy and give hackers an open door to your most critical data. By conducting software security testing, you can reinforce your applications while still focusing on the functionality that staff members are looking for.

It's also important to note that software in general should be thoroughly tested to ensure better quality and mitigate any actionable defects. The Online Trust Alliance found that 90 percent of breaches could have been prevented in the first half of 2014. This can be done from a combination of educating employees, enforcing password management and conducting regular app testing. Further, CAST Research Labs found a direct correlation between data breaches and poor code quality across consumer applications. By focusing on testing and using the right tools, organizations can mitigate these threats and strengthen their overall security capabilities in the process.

About Sanjay Zalavadia
As the VP of Client Service for Zephyr, Sanjay Zalavadia brings over 15 years of leadership experience in IT and Technical Support Services. Throughout his career, Sanjay has successfully established and grown premier IT and Support Services teams across multiple geographies for both large and small companies.

Most recently, he was Associate Vice President at Patni Computers (NYSE: PTI) responsible for the Telecoms IT Managed Services Practice where he established IT Operations teams supporting Virgin Mobile, ESPN Mobile, Disney Mobile and Carphone Warehouse. Prior to this Sanjay was responsible for Global Technical Support at Bay Networks, a leading routing and switching vendor, which was acquired by Nortel. He has also held management positions in Support Service organizations at start-up Silicon Valley Networks, a vendor of Test Management software, and SynOptics.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

Latest Cloud Developer Stories
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchai...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mo...
Nordstrom is transforming the way that they do business and the cloud is the key to enabling speed and hyper personalized customer experiences. In his session at 21st Cloud Expo, Ken Schow, VP of Engineering at Nordstrom, discussed some of the key learnings and common pitfalls of...
The need for greater agility and scalability necessitated the digital transformation in the form of following equation: monolithic to microservices to serverless architecture (FaaS). To keep up with the cut-throat competition, the organisations need to update their technology sta...
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in orde...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE