This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Awareness of remote working, cloud computing and use of mobile devices will affect businesses in the future

Share this article:

Cloud computing, the increasing use of mobile devices and the merging of home and work life have been identified as being among the top ten most likely threat scenarios that organisations may face in the future.

According to the Information Security Forum (ISF) Threat Horizon 2012 report, core themes include the lack of investment in critical infrastructure at a national and organisational level. This warns that there is an over-reliance on internet-only channels and the advent of cloud computing and mobile working, combined with poor internet resilience at pinch points on the network, means businesses will need contingency plans to continue operating when the internet fails.

It also warns of how the 'internet generation' and the merge of work and home life have caused changes in attitudes to protecting information.  Personally owned mobile devices are routinely used for business and connect to the network, while business is now regularly conducted via social networking sites.

Adrian Davis, principal research analyst at ISF, said that smartphones in particular have become the device of choice and many organisations have developed bespoke applications and rolled them out to mobile workers, further blurring the line between personal and business use.

He said: “This raises a number of added security implications as devices now share many characteristics of the mainframe, like middleware, but the security model is simply not adapting to these new demands.  With mobile payment facilities becoming more viable, these devices will become even more lucrative to cyber criminals.

“Security issues apply to everyone, regardless of industry, size and structure – everyone needs to apply best practice and processes when it comes to securing their vital assets. Predicting the future is never an exact science, but it does allow organisations to take an informed approach to risk and security planning and build in necessary precautions.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud

Exclusive video webcast & Q&A sponsored by Vormetric

As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.

View the webcast here to find out more

More in News

Google and Facebook offer free cyber-security tools

Google and Facebook offer free cyber-security tools

Google and Facebook have both launched free open-source cyber-security tools this week, designed to help security professionals spot malware and cyber-attacks.

Mixed results for key Government cyber-initiatives

Mixed results for key Government cyber-initiatives

The Government's Verify scheme to confirm IDs is behind scheuduled uptake, but its CISP threat intelligence sharing scheme is ahead of target.

Hundreds of companies face 2,000 cyber-attacks in EU exercise

Hundreds of companies face 2,000 cyber-attacks in EU ...

The European Network and Information Security Agency (ENISA) conducted a 24-hour cyber-exercise in which more than 200 organisations from 25 EU member states faced virtual cyber-attacks from white hat hackers ...