The beginning of a new year is the perfect time to look back at the opportunities and mistakes of the year before, analyze anticipated trends that will result and make predictions based on information gleaned. In the realm of cloud communications, there were some recent predictions shared by GFI’s David Kelleher that can affect both the business and end user that are worth noting.
Kelleher’s predictions, originally shared in a recent GFI blog, really hit home for what many are already bracing for. Let’s take a look at his predictions, what TMC has to say about some of them and then you can judge for yourself which of his estimations will come to fruition.
Believe it or not, Kelleher is predicting a comeback, but it’s more unconventional than you’re probably thinking. This resurfacing may not have the same warm welcome allowed for, say, Google (News - Alert)+. Kelleher believes some of the buzz may be worth noting in that anew design and strategy could be just enough to attract those who like to use social media to prey on unsuspecting victims. If you start to receive bogus MySpace invites, the site may actually have a chance.
For some, the idea of bringing their own device to work is not a new concept. In fact, a company with which I was employed more than 10 years ago required that I carry my own mobile phone, as it was a standard in the industry. The difference today, however, is that these mobile devices are now smart, and they’re being used to access the corporate network. Of course, this leads to the debate of whether the solutions and policies in place can truly protect the network and the user – something we’re bound to continue seeing into 2013.
Looking for a few tips to ensure a risk-free environment? Anders Lofgren, director of product management and mobility at GroupLogic, recently shared some, including the completion of a full security audit; the implementation of mobile device management; the use of solutions to integrate with the active director; the provision of simple solutions that allow for secure access; role-based access; and the implementation of a strategy that allows the business to be prepared for the worst.
Criminals and Cyber Attacks
As mobile use increases, so too will the attempts by those on the wrong side of the law to access information that leads to data and money. Much of this access will result from bogus apps, many of which are available on legitimate sites such as Google Play. Likewise, gamers will continue to be the target for hacking, malware, phishing and scams; it doesn’t take too much prowess to design a site to attract even the most sophisticated gamer. As account credentials are shared, the individual is quickly exploited.
Just how vulnerable can you be when completing transactions online? Believe it or not, it was recently reported that mobile users fell prey to malware disguised as the latest edition of Angry Birds – one of the most popular and played games today. Criminals also used Twitter, Facebook (News - Alert) and international shipping brands to launch a number of attacks, and because the brand name was so trusted, victims were easily swayed.
For malicious individuals, the mobile user is the golden ticket. Until all end points are scanned and managed effectively by the IT department, hackers will continue to target mobile users. What may be the most frightening realization is that victims don’t have to misplace or lose the device to be vulnerable. Hackers only need access to a corporate network with vulnerabilities – that’s really all it takes. Hackers will most likely unfortunately continue to up the ante on their spiteful inventiveness in 2013.
Mobile expert Tone Rizzo recently examined a few such threats anticipated in 2013, including targeted attacks and cyber-espionage; hacktivism; nation-state-sponsored cyber-attacks; the use of legal surveillance tools; malware threats; privacy threats; the compromise of once trusted websites; cyber extortion; Mac OS malware; mobile malware, and more. To see his predictions in full, click here.
The hard reality is that as cloud communications continues to grow in popularity, it also grows in its attraction for criminals. If you want to be truly prepared for 2013, it’s time to take a look at your technology strategy and how you can benefit without the risk. That’s certainly something GFI’s expertise can help with.
Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO Miami 2013, Jan 29- Feb. 1 in Miami, Florida. Stay in touch with everything happening at ITEXPO (News - Alert). Follow us on Twitter.
Small to mid-sized businesses are under attack
Until small to mid-sized businesses (SMBs) take proactive, measurable improvements to IT security, many will succumb to cyber criminals...
The Technology Trap: How your business can break out and step up
Technology management itself can be a time-consuming exercise and requiring a lot of administrative time...
Unlocking the benefits of managing IT services in the cloud
Managing IT can quickly become a logistical and cost headache for organizations of all sizes...
A business case for cloud-based IT management
Cloud computing services have seen rapid adoption among organizations of all sizes...