Symantec Report Keeps Cloud Users Security-Savvy

Symantec Report Keeps Cloud Users Security-Savvy

Symantec Report Keeps Cloud Users Security-Savvy

Users of cloud services can easily fall foul of complacency.  With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device.  But for as long as we use devices for authentication and access to our cloud accounts, a threat to a device means a threat to our cloud-stored data.  This is why each time Symantec releases a new intelligence report, the wiser cloud users take notice.  cybercrime-report

This white paper presents an essential overview of web-born dangers aimed at everyone from IT security personnel down to everyday computer users.  With so much of the threat landscape still based on human deception and manipulation, knowledge remains the single most effective form of protection.  The Symantec intelligence report puts in one place all the things we need to know to stay safe from attack.

The latest publication, containing digested data up to September 2013, addresses a wide scope of security threats:  Targeted Attacks, Social Media and Data Breaches, Mobile Threats, Software-based Vulnerabilities, Spam, Phishing and Malware.

One worrying new horizon that has emerged is that after a low-threat August, September saw a 20% resurgence in new security vulnerabilities.  Cybercriminals were not being beaten back, it would seem: they were simply on holiday.

The given statistics for mobile-based attacks were even more troubling – a steady rise of malware variants is evident in the last twelve months (now numbering over 7,000), with a 55% jump in new variants from July to September.  In short, it has never been more important to access cloud data from a carefully-secured mobile device.

The threats are not at all limited to the public domain.  Businesses and those representing them face targeted hacking attacks that shift focus with alarming speed.  No longer is it small manufacturing companies that are the primary target of Intellectual Property cyberthieves: companies with fewer than 250 employees do still attract 48% of all new attacks on organizations, but it is now the service sector which is the most under-threat industry. Companies delivering professional services now account for 22.2% of all attacks, with public administration organisations drawing in 19.2% of the fire.

What specific lessons can cloud users take from the report?  Symantec’s motivation for the publication is to raise awareness of the scale and form of threats occurring and to encourage protection by relating how today’s attacks are carried out.  By staying abreast of the security exploits laid out in the report, and heeding the given predictions, users of cloud services can make educated choices about the devices, applications and security precautions they employ when interacting with their cloud accounts.  Judging by the high proportion of attacks that small firms are gathering, another lesson might be to trust the large cloud providers sooner than the small.

By Gill-Chris Welles

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Four C’s – Cloud, Culture, Clash, Change

The Four C’s – Cloud, Culture, Clash, Change

The Cloud, Culture, Clash, Change “I told the new CTO that this cloud stuff was BS. He came charging in with this ‘cloud first policy’ and look what happened. Previously rock solid systems that had worked for years slowed down and had outages as we tried to run them on the cloud. I doubt that…

Principles For Data Protection In The Cloud In 2016

Principles For Data Protection In The Cloud In 2016

Data Protection In The Cloud 2015 ushered in the start of a data economy. As organizations amass more detailed consumer profiles they have begun realizing that data could equal or surpass the value of the products and services they sell, especially in the Internet of Things era with its constant and very personal streams of…

Immune Systems: Information Security And Risk In 2016

Immune Systems: Information Security And Risk In 2016

Information Security And Risk C-suite executives have woken up to the threat posed by data theft, denial-of-service attacks and vulnerable systems. In 2015, for example, a series of high-profile cases illustrated the degree to which such attacks can damage a company’s reputation, brand and, ultimately, profits. Where businesses once undervalued cybersecurity, considering it the domain of CIOs and…

Managed Services Providers (MSPs) – Urged To Embrace The Cloud

Managed Services Providers (MSPs) – Urged To Embrace The Cloud

Managed Services Providers (MSPs)  If you’ve been observant of the MSP industry over the last two years, you’ve no doubt noticed that it has had significant difficulty expanding its service capabilities and growing its revenue stream around cloud computing. At least that was the analysis of recent market research studies assessing the status of cloud…

Here Are Four Ways To Elevate IT

Here Are Four Ways To Elevate IT

Here Are Four Ways To Elevate IT Prior to joining the consulting side of the industry, I worked in corporate IT for the first 7-8 years of my career. While my time in corporate IT has long come to a close, I can still vividly recall the pain points and dreaded battles I endured. A…

Drones: Unlimited Possibilities Await Us – Good And Bad

Drones: Unlimited Possibilities Await Us – Good And Bad

Drones: Unlimited Possibilities I have written two recent posts here on CloudTweaks about drones. The first, ‘The Pizza Delivery Drone’, was a somewhat comical look at what possibly is to come with future drones. The second was a look at the more immediately possible concept of a modular drone.  Modular drones are capable of supporting…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor