Here are the top threats to look out for this year:
- Cyber security decisions will be based on security, rather than regulations. The growing infrastructure of hackers and data breaches will mean businesses will be protecting themselves out of necessity, rather than regulation
- The rise of ‘cyber brokers’. There will be an increasing supply and demand for compromised machines containing sensitive data.
- An increase in hackersautomating social media attacks
- Time will be wasted as IT professionals profess regulation of end-user devices and cloud data access, instead of controlling data at the source
- There will be inadequate security around big data (NoSQL) inhibiting integration as third party components within companies.
- Organisations will have to look for tools to protect and control access, as internal collaboration suites (such as Microsoft Sharepoint and Jive) might be deployed in ‘evil twin’ (external) modes.
- In regards to DDoS, attackers will increase sophistication and effectiveness by shifting from network level to application level attacks (even business logic level attacks), citing increasing exploitation of SQL injection vulnerabilities as one of the modes.
- The HTML 5 standard will enable hackers to exploit vulnerabilities in the browser’s themselves to install malware.
- There is currently a rise in attacks which target the worldwide infrastructure that supports SSL. Imperva expect these attacks to reach a tipping point in 2012 which, in turn, will invoke a serious discussion about real alternatives for secure web communications.
Source: Imperva, Works Management
Protect you and your business for 2012 and implement ISO 27001; the international best practice for an Information Security Management System (ISMS). Breeze through ISO 27001 with the Standalone ISO27001 ISMS Documentation Toolkit.
This toolkit contains simply everything you need to accelerate your ISO 27001 project and to protect yourself from the cyber security threats listed above. This toolkit contains documentation templates, policies and procedures to ensure all your documentation is drafted in line with the requirements of the ISO/IEC 27001 standard.
|Standalone ISO27001 ISMS Documentation Toolkit