Month: December 2015
It has become a cliché. Pundits and cybersecurity analysts, time and time again, talk about how a top cybersecurity trend for the New Year will be more cybersecurity attacks. I want to provide a different approach on what we can expect from a cybersecurity standpoint in 2016 with my personal top five list:
It seems like every year analysts warn about the Internet of Things (IoT) being the next big thing. It appears as though instead of a large splash, IoT is simply quietly growing more and more each year.
The reason why this growth is silent and potentially cybersecurity-related is due primarily by how seemingly innocuous this technology appears. IoT technically refers to small networkable operational technologies like “smart” traffic lights that detect traffic patterns and adjust accordingly, or networkable home appliances that can turn on via mobile devices. However, unlike many peers, I consider “Wearables” IoT devices as well. I also believe these less secure devices may be the first IoT to be hacked successfully in the near future.
Wearables are items like fitness trackers that you can wear on your wrist. According to some sources, there will be an estimated 780 million wearable devices by 2019. The math will work out to about one wearable device on every 10 people. The security challenge with wearables comes from the inherently poor-written code that often creates a back door to the smartphone.
Along the lines of security issues with IoT, OT like manufacturing devices, utility valves, or Supervisory Control and Data Acquisition (SCADA) will continue to represent cybersecurity challenges in 2016.
One consumer-oriented OT that may top the list is the “connected car.” According to the same report mentioned above, attacks on automobile systems may increase rapidly in 2016 due to the major increase in connected automobile hardware built without “foundational security principles.”Read More
Since mobility has become a twenty-first century phenomena, it has offered great opportunities to organisations to enhance their business and marketing strategies, allowing for a more dynamic, contemporary and flexible approach. As a result, mobility has improved customer engagements, global brand recognition, expansion of advertising methods, internal staff collaboration and most importantly, the empowerment of employees. Employees are greatly benefited from mobility as they can work while they are on the go with exclusive flexibility, especially with password reset self-service.
A recent study by Travis Bradberry represented this flexible culture of Netflix and how the company allows staff members to work remotely without having to adhere to a strict 9-5 work routine. The study showed that providing autonomy did not result in a lack of accountability but rather has increased the market cap of Netflix by $51 billion.
Mobility and technological innovation allows employees to work from various different devices such as, smartphones, tablets and laptops which also means that security is at the top of the agenda for organisations.
One of the predominant security concern for the IT department and the operations team is strong password management and a robust network infrastructure for their company. It is possible for the IT department to become inundated when mobility becomes a technological culture within the business. Forgetting passwords, resetting passwords and unlocking accounts can become a hassle for the IT department as well the employees. Furthermore, managing users in Active Directory can also be a constant job. Such issues are driving the demand for password self-service applications where employees can manage their own accounts from any device and at any time.Read More