Top 10 Security Trends of 2012

  • 854 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • good one
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
854
On Slideshare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
0
Comments
1
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Top 10 Security Trends in 2012
  • 2. It was not business as usual in 2011. Some of the world’slargest corporations were hacked, breached and cyberattacked. What does this spell for 2012?January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 2
  • 3. 1. More HackingWhether they’re bored teenagers, government spies,corporate saboteurs or hacktivists, expect more hackers in2012. Sadly, the vulnerabilities of 2011 are far from fixed.January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 3
  • 4. 2. Human ErrorHow do many of these hack attacks happen? People makemistakes. Simple as that. Click a spam email, it leads to aTrojan horse, and there goes the network. It happens thateasily. Without proper employee training, it will continue.January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 4
  • 5. 3. Data Breach InsuranceThe business response to all these hacker attacks?Minimize risk. Cyber liability policies will take off in 2012 asthe last, but necessary, line of defense.January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 5
  • 6. 4. Extra Pieces of PiiOnce upon a time, personally identifiable information, orPii, was your Social Security number, birth date andmother’s maiden name. Now, thanks to breaches like thoseat Sony and Epsilon, the definition is expanding to includeemail addresses, passwords and PINs.January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 6
  • 7. 5. Privacy PlanningAs the definition of privacyexpands, so will the waysbusinesses handle personal information. More companieswill follow Privacy by Design, that is, build security into theirproducts and services at the developmental stage insteadof waiting for a government mandate.January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 7
  • 8. 6. Cracking DownThe Federal Trade Commission took on Facebook in 2011for “unfair and deceptive” handling of user information.Look for the FTC to continue its hard stance againstcompanies that play fast and loose with consumer data.January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 8
  • 9. 7. Redefining ‘Security’Watch the definition of “security” change in 2012.Government agencies, Congress, the courts and the mediaall will seek to figure out what is reasonable protectionwhen it comes to the corporate handling of personal data.January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 9
  • 10. 8. Breach Notification LawsNew breach notification laws surely will be seen in parts ofthe Western Hemisphere this year. Germany passed a lawrequiring breach notification in 2010, and many ofGermany’s neighbors are considering it, as is Canada. Butwhat about the U.S.? Unlikely.January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 10
  • 11. 9. Cloud Security ConcernsAs more computers, devices and users migrate to thecloud–storing files and running applications on the web–expect more talk of cloud security. Especially since thecloud isn’t governed by the outdated ElectronicCommunications Privacy Act, which establishes what kindof information government and police agencies can access,and how.January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 11
  • 12. 10. Social Media AttacksSocial media accounts are as vulnerable as the cloud. Justask Lady Gaga, whose little monsters were recently dupedinto signing up for a Gaga edition iPad. The rub: Informationsimply went to a social-media-savvy conman. We’ll see moreattacks on individual and corporate social media accounts,for sure.January 2012 © 2003-2011 Identity Theft 911, LLC. All Rights Reserved - Confidential 12