Symantec Report Keeps Cloud Users Security-Savvy

Symantec Report Keeps Cloud Users Security-Savvy

Symantec Report Keeps Cloud Users Security-Savvy

Users of cloud services can easily fall foul of complacency.  With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device.  But for as long as we use devices for authentication and access to our cloud accounts, a threat to a device means a threat to our cloud-stored data.  This is why each time Symantec releases a new intelligence report, the wiser cloud users take notice.  cybercrime-report

This white paper presents an essential overview of web-born dangers aimed at everyone from IT security personnel down to everyday computer users.  With so much of the threat landscape still based on human deception and manipulation, knowledge remains the single most effective form of protection.  The Symantec intelligence report puts in one place all the things we need to know to stay safe from attack.

The latest publication, containing digested data up to September 2013, addresses a wide scope of security threats:  Targeted Attacks, Social Media and Data Breaches, Mobile Threats, Software-based Vulnerabilities, Spam, Phishing and Malware.

One worrying new horizon that has emerged is that after a low-threat August, September saw a 20% resurgence in new security vulnerabilities.  Cybercriminals were not being beaten back, it would seem: they were simply on holiday.

The given statistics for mobile-based attacks were even more troubling – a steady rise of malware variants is evident in the last twelve months (now numbering over 7,000), with a 55% jump in new variants from July to September.  In short, it has never been more important to access cloud data from a carefully-secured mobile device.

The threats are not at all limited to the public domain.  Businesses and those representing them face targeted hacking attacks that shift focus with alarming speed.  No longer is it small manufacturing companies that are the primary target of Intellectual Property cyberthieves: companies with fewer than 250 employees do still attract 48% of all new attacks on organizations, but it is now the service sector which is the most under-threat industry. Companies delivering professional services now account for 22.2% of all attacks, with public administration organisations drawing in 19.2% of the fire.

What specific lessons can cloud users take from the report?  Symantec’s motivation for the publication is to raise awareness of the scale and form of threats occurring and to encourage protection by relating how today’s attacks are carried out.  By staying abreast of the security exploits laid out in the report, and heeding the given predictions, users of cloud services can make educated choices about the devices, applications and security precautions they employ when interacting with their cloud accounts.  Judging by the high proportion of attacks that small firms are gathering, another lesson might be to trust the large cloud providers sooner than the small.

By Gill-Chris Welles

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About Latest Posts Follow Us!CloudTweaksEstablished in 2009,

Cloud Infographic: Cloud Computing Growth

Cloud Infographic: Cloud Computing Growth

An excellent infographic provided by AwesomeCloud which predicts a continued high level of growth in the cloud computing industry. Potentially staggering numbers for Public Cloud IT Services of $100 Billion by 2016. Infographic Source: AwesomeCloud About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the

Cloud Infographic: Most Used Cloud Apps

Cloud Infographic: Most Used Cloud Apps

Cloud app and analytics company, Netskope released its quarterly Cloud Report. The new report reveals that enterprise employees are using an average of 397 different cloud apps (most of which are unsanctioned), when IT estimated they have 40-50 — that’s a tenfold underestimation. Below is an infographic provided courtesy of the group at Netskope which goes into further detail.

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving