This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Awareness of remote working, cloud computing and use of mobile devices will affect businesses in the future

Share this article:

Cloud computing, the increasing use of mobile devices and the merging of home and work life have been identified as being among the top ten most likely threat scenarios that organisations may face in the future.

According to the Information Security Forum (ISF) Threat Horizon 2012 report, core themes include the lack of investment in critical infrastructure at a national and organisational level. This warns that there is an over-reliance on internet-only channels and the advent of cloud computing and mobile working, combined with poor internet resilience at pinch points on the network, means businesses will need contingency plans to continue operating when the internet fails.

It also warns of how the 'internet generation' and the merge of work and home life have caused changes in attitudes to protecting information.  Personally owned mobile devices are routinely used for business and connect to the network, while business is now regularly conducted via social networking sites.

Adrian Davis, principal research analyst at ISF, said that smartphones in particular have become the device of choice and many organisations have developed bespoke applications and rolled them out to mobile workers, further blurring the line between personal and business use.

He said: “This raises a number of added security implications as devices now share many characteristics of the mainframe, like middleware, but the security model is simply not adapting to these new demands.  With mobile payment facilities becoming more viable, these devices will become even more lucrative to cyber criminals.

“Security issues apply to everyone, regardless of industry, size and structure – everyone needs to apply best practice and processes when it comes to securing their vital assets. Predicting the future is never an exact science, but it does allow organisations to take an informed approach to risk and security planning and build in necessary precautions.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Brit Lauri Love faces more US hacking charges

Brit Lauri Love faces more US hacking charges

Lauri Love, a 29-year-old British man from Stradishall in Suffolk, has been charged by a US court with hacking into multiple US government computers and stealing more than 100,000 employee ...

StubHub ticketing agency taken for a million pounds

StubHub ticketing agency taken for a million pounds

Police around the world have arrested seven people - thought to have been tied into an international fraud ring - that allegedly defrauded the eBay-owned StubHub online ticketing service of ...

DDoS attacks grow as first DIY kits emerge

DDoS attacks grow as first DIY kits emerge

The latest report from Akamai Technologies has revealed another increase in DDoS attacks and the resurgence of botnets to carry out server-based attacks.