Symantec Report Keeps Cloud Users Security-Savvy

Symantec Report Keeps Cloud Users Security-Savvy

Symantec Report Keeps Cloud Users Security-Savvy

Users of cloud services can easily fall foul of complacency.  With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device.  But for as long as we use devices for authentication and access to our cloud accounts, a threat to a device means a threat to our cloud-stored data.  This is why each time Symantec releases a new intelligence report, the wiser cloud users take notice.  cybercrime-report

This white paper presents an essential overview of web-born dangers aimed at everyone from IT security personnel down to everyday computer users.  With so much of the threat landscape still based on human deception and manipulation, knowledge remains the single most effective form of protection.  The Symantec intelligence report puts in one place all the things we need to know to stay safe from attack.

The latest publication, containing digested data up to September 2013, addresses a wide scope of security threats:  Targeted Attacks, Social Media and Data Breaches, Mobile Threats, Software-based Vulnerabilities, Spam, Phishing and Malware.

One worrying new horizon that has emerged is that after a low-threat August, September saw a 20% resurgence in new security vulnerabilities.  Cybercriminals were not being beaten back, it would seem: they were simply on holiday.

The given statistics for mobile-based attacks were even more troubling – a steady rise of malware variants is evident in the last twelve months (now numbering over 7,000), with a 55% jump in new variants from July to September.  In short, it has never been more important to access cloud data from a carefully-secured mobile device.

The threats are not at all limited to the public domain.  Businesses and those representing them face targeted hacking attacks that shift focus with alarming speed.  No longer is it small manufacturing companies that are the primary target of Intellectual Property cyberthieves: companies with fewer than 250 employees do still attract 48% of all new attacks on organizations, but it is now the service sector which is the most under-threat industry. Companies delivering professional services now account for 22.2% of all attacks, with public administration organisations drawing in 19.2% of the fire.

What specific lessons can cloud users take from the report?  Symantec’s motivation for the publication is to raise awareness of the scale and form of threats occurring and to encourage protection by relating how today’s attacks are carried out.  By staying abreast of the security exploits laid out in the report, and heeding the given predictions, users of cloud services can make educated choices about the devices, applications and security precautions they employ when interacting with their cloud accounts.  Judging by the high proportion of attacks that small firms are gathering, another lesson might be to trust the large cloud providers sooner than the small.

By Gill-Chris Welles

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Are You Sure You Are Ready For The Cloud? SDI

Are You Sure You Are Ready For The Cloud? SDI

Software Defined Infrastructure Well, we have come full circle with this string of subjects; about making sure you are ready for the cloud. We have talked security, storage, access, connectivity and feasibility to name a few. Now, lets discuss SDI. What is SDI? It simply stands for “Software Defined Infrastructure”. Many people have their own…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

What Forecasts Of Data Breaches Should Spell To Cloud Security Practitioners

What Forecasts Of Data Breaches Should Spell To Cloud Security Practitioners

Cloud Security Practitioners And Auditors Today we have seen relatively few data breaches in the cloud despite its growing use for mission-critical workloads. However, as cloud increasingly becomes the backend for our mobile devices, for the Internet of Things (IoT) and for other daily life functions, we can safely predict that hackers will set their…

How To Use Big Data And Analytics To Help Consumers

How To Use Big Data And Analytics To Help Consumers

Big Data Analytics Businesses are under increasing pressure to develop data-driven solutions. The competitive advantage gained by a successful strategy can be immense. It can create new opportunities and help businesses to react to different scenarios or sudden changes in the market. But innovation and resilience are not easily achieved, and organizations always face difficult…

Newton’s First Law and Cloud

Newton’s First Law and Cloud

Scaling the Mountain “You’re kidding me, the server went down? What are we supposed to do about launching the new website? We promised our partners that we would go live this weekend. I’ll admit its forty new pages but it’s just a website. How long before it all gets fixed?” I’ll bet you have been to this…

How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles
Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing In The Cloud Marketers are constantly looking for better ways to tantalize and engage customers, and there’s no space more competitive than the digital universe. Deliberating over pleasing layouts, effective calls to action, site responsiveness, and much more, digital marketers have more than enough to keep themselves busy without understanding the intricacies…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor