This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Awareness of remote working, cloud computing and use of mobile devices will affect businesses in the future

Share this article:

Cloud computing, the increasing use of mobile devices and the merging of home and work life have been identified as being among the top ten most likely threat scenarios that organisations may face in the future.

According to the Information Security Forum (ISF) Threat Horizon 2012 report, core themes include the lack of investment in critical infrastructure at a national and organisational level. This warns that there is an over-reliance on internet-only channels and the advent of cloud computing and mobile working, combined with poor internet resilience at pinch points on the network, means businesses will need contingency plans to continue operating when the internet fails.

It also warns of how the 'internet generation' and the merge of work and home life have caused changes in attitudes to protecting information.  Personally owned mobile devices are routinely used for business and connect to the network, while business is now regularly conducted via social networking sites.

Adrian Davis, principal research analyst at ISF, said that smartphones in particular have become the device of choice and many organisations have developed bespoke applications and rolled them out to mobile workers, further blurring the line between personal and business use.

He said: “This raises a number of added security implications as devices now share many characteristics of the mainframe, like middleware, but the security model is simply not adapting to these new demands.  With mobile payment facilities becoming more viable, these devices will become even more lucrative to cyber criminals.

“Security issues apply to everyone, regardless of industry, size and structure – everyone needs to apply best practice and processes when it comes to securing their vital assets. Predicting the future is never an exact science, but it does allow organisations to take an informed approach to risk and security planning and build in necessary precautions.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Password recovery made too easy

Password recovery made too easy

A senior malware analyst has slammed the availability of a `password recovery' utility from Freehostia, noting that the software actually uses network admin utilities to take credentials from the users' ...

Belgacom says alleged GCHQ APT attack cost firm £12 million

Belgacom says alleged GCHQ APT attack cost firm ...

One year on from a nation-state APT which infected 26,000 machines across 124 systems at telecom operator Belgacom and the firm has detailed the cost and manpower involved in the ...

CryptoWall compromises 40,000 UK citizens

CryptoWall compromises 40,000 UK citizens

Research just published claims to show that ransomware - in the shape of CryptoWall - is still generating healthy volumes of income for the cyber-criminals behind the code.