The Lighter Side Of The Cloud – Clandestine
The Lighter Side Of The Cloud – iPhone Anticipation
The Lighter Side Of The Cloud – Information Highway
Symantec Report Keeps Cloud Users Security-Savvy

Symantec Report Keeps Cloud Users Security-Savvy

Symantec Report Keeps Cloud Users Security-Savvy

Users of cloud services can easily fall foul of complacency.  With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device.  But for as long as we use devices for authentication and access to our cloud accounts, a threat to a device means a threat to our cloud-stored data.  This is why each time Symantec releases a new intelligence report, the wiser cloud users take notice.  cybercrime-report

This white paper presents an essential overview of web-born dangers aimed at everyone from IT security personnel down to everyday computer users.  With so much of the threat landscape still based on human deception and manipulation, knowledge remains the single most effective form of protection.  The Symantec intelligence report puts in one place all the things we need to know to stay safe from attack.

The latest publication, containing digested data up to September 2013, addresses a wide scope of security threats:  Targeted Attacks, Social Media and Data Breaches, Mobile Threats, Software-based Vulnerabilities, Spam, Phishing and Malware.

One worrying new horizon that has emerged is that after a low-threat August, September saw a 20% resurgence in new security vulnerabilities.  Cybercriminals were not being beaten back, it would seem: they were simply on holiday.

The given statistics for mobile-based attacks were even more troubling – a steady rise of malware variants is evident in the last twelve months (now numbering over 7,000), with a 55% jump in new variants from July to September.  In short, it has never been more important to access cloud data from a carefully-secured mobile device.

The threats are not at all limited to the public domain.  Businesses and those representing them face targeted hacking attacks that shift focus with alarming speed.  No longer is it small manufacturing companies that are the primary target of Intellectual Property cyberthieves: companies with fewer than 250 employees do still attract 48% of all new attacks on organizations, but it is now the service sector which is the most under-threat industry. Companies delivering professional services now account for 22.2% of all attacks, with public administration organisations drawing in 19.2% of the fire.

What specific lessons can cloud users take from the report?  Symantec’s motivation for the publication is to raise awareness of the scale and form of threats occurring and to encourage protection by relating how today’s attacks are carried out.  By staying abreast of the security exploits laid out in the report, and heeding the given predictions, users of cloud services can make educated choices about the devices, applications and security precautions they employ when interacting with their cloud accounts.  Judging by the high proportion of attacks that small firms are gathering, another lesson might be to trust the large cloud providers sooner than the small.

By Gill-Chris Welles

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!

Sorry, comments are closed for this post.

Popular

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker Docker started as just a software container on top of a Linux operating system which seemed like a simple optimization for a fat hypervisor. Its disruptive force however comes from the fact that it does force us to rethink many of the layers of the cloud stack. Starting from the way we…

How The Cloud Is Changing Disaster Recovery

How The Cloud Is Changing Disaster Recovery

How the Cloud is Changing Disaster Recovery Anyone who is a regular reader of this site will know about the cloud’s numerous benefits. Using the cloud can provide businesses with cost-effective resource usage, rapid provisioning, easy scalability and flexible elasticity – benefits that simply don’t exist when using local on-site servers and services. One of…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

Cloud-Based VOIP – 4 Alternatives To Skype

Cloud-Based VOIP – 4 Alternatives To Skype

Cloud-Based VOIP – 4 Alternatives To Skype Skype is the most popular cloud-based VOIP service. Since being bought out by Microsoft for $8.5 billion in 2011 the company has grown to more than 300 million users and now accounts for 34% of all international calls. Some people don’t want to use Skype though. Reports of…

Recent

Thinking About Doing Business In China? Consider This…

Thinking About Doing Business In China? Consider This…

Doing Business in China? Consider This…  China’s economy continues to outperform both regional and global markets with double-digit growth for the last decade. IDC believes China’s GDP will maintain growth around 7.2% until 2020, allowing GDP to reach US$18 trillion or 17% of the world total. And with a population of over 1.35 billion people,…

Big Tech Trends For The 21st Century

Big Tech Trends For The 21st Century

Tech Trends For The 21st Century When the historians of the future look back on the 21st century, what will they say? Inevitably, the biggest stories in the coming century will be political and environmental – wars, revolutions, and natural disasters always dominate historical memory. But perhaps more than any previous epoch, the 21st century…

The Lighter Side Of The Cloud – Inferiority Complex

The Lighter Side Of The Cloud – Inferiority Complex

By Al Johnson Are you looking to supercharge your Newsletter, Powerpoint presentation, Social media campaign or Website? Our universally recognized tech related comics can help you. Contact us for information on our commercial licensing rates. About Latest Posts Follow Us!CloudTweaksEstablished in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information.…

Contact Us

Sending
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising