Hire Patriots
760 730-3734
Call us for more details!
Mail us today
ceo@hirepatriots.com
/ News And Blogs /Subscribe to RSS Feed

Enterprises must manage risks to data, brands amidst new threats: report

Posted by on March 27, 2012 in Uncategorized

Summary: The ISF Threat Horizon report, based on cyber security predictions through 2014, outlines three specific types of threats that we can expect to face in the next couple of years.

Traditional risk management is insufficient when it comes to dealing with newer cyberspace risks, according to a new report from the Information Security Forum, an international authority on information security.

The ISF Threat Horizon report, based on cyber security predictions through 2014, outlines three specific types of threats that we can expect to face in the next couple of years:

  • External threats: These are more sophisticated attacks, stemming from either state state-sponsored espionage or hacktivists, with the intention of having a physical impact in the real world.
  • Regulatory threats: More like just an actual warning rather than a harmful action, these types of attacks are designed to call for greater transparency and security preparedness.
  • Internal threats: Much like the old adage of keeping your friends close but your enemies closer, sometimes the greatest threats come from within the same business. These threats might not always be intentionally malicious either. Just think about all the worries surrounding connecting unprotected personal devices to work networks.

Researchers advised in the report that enterprise risk management and preparedness, in particular, must be a higher priority in order to create risk resilience.

Furthermore, ISF researchers remind global enterprises that not only are their sensitive resources and information at risk, but their brand as well.

One of the easiest examples of how a major cyber attack (such an “external threat”) can harm a company’s brand with its customers over the long term is Sony after the PlayStation Network was hacked in spring 2011. Although the company rebounded, it’s hard to argue that a significant amount of trust from consumers hasn’t been lost.

Related:

Certified Wireless Network Administrator | CWNA | CWNA Training | CWNA Classes | Wireless Network Administration | Wireless Security Training | CWNA Certification

Certified Wireless Security Professional | CWSP Certification | Wireless Security Professional | CWSP Training | CWSP Classes

Certified Wireless Network Professional | CWNP Certification | CWNP Classes | CWNP Training | Wireless Network Professional

CISSP Training | CISSP | CISSP Prep Review | CISSP Prep | CISSP Certification

Certified Ethical Hacker | CEH Prep | Ethical Hacking | Ethical Hacker | CEH Certification | CEH

CompTIA Security+ Training | Security+ | Security+ Certification | Security+ Classes

ISMS Lead Auditor | ISMS | ISMS Training | ISMS Lead Auditor Training

Computer Forensics Training | Computer Forensics | Computer Forensics Certification | Computer Forensics Class

Facebook Comments

Share us on

About The Author
Security University

Follow me on