Categories: Security News

Cybersecurity Will Get More Complex in 2014

Bad news for all businesses, big and small. Cybersecurity is going to get a lot more complicated in 2014. Global nonprofit IT association ISACA believes IT and cybersecurity professionals should resolve now to gear up for accelerated change and complexity in 2014, especially in cybersecurity, data privacy and big data.

“The pace of change expected in 2014 will put incredible pressure on technology professionals in the workplace with a focus on keeping IT risk in check while at the same time delivering value to the business,” said Bhavesh Bhagat, CEO of EnCrisp, co-founder of Confident Governance and member of ISACA’s new emerging business and technology committee.

Among the areas ISACA predicts businesses should be preparing for in 2014 include:

  • Prepare for privacy 2.0: Attitudes toward data privacy are unlikely to reach a consensus in 2014. Instead, be prepared to accommodate both those with little expectation of privacy and those who view their personal data as currency and want to control how that currency is spent.
  • Slim down big data: Explosive data volumes were the No. 1 issue posed by big data in ISACA’s 2013 IT Risk/Reward Barometer. Unmanageable data creates redundancies and is difficult to secure. In 2014, eliminate the excess and consolidate what remains, to promote sharing and protect using better controls.
  • Plan to compete for cybersecurity and data analytics experts: The need for smart analytics people and cybersecurity defenders with the right certifications is only going to grow in 2014. Businesses that plan on hiring in the new year need to make sure their compensation package and job descriptions are competitive.
  • Rethink how your enterprise is using your information security experts: With some elements of IT security operational responsibility (including malware detection, event analysis and control operation) increasingly being outsourced to cloud providers, smart leaders are enabling their internal security experts to become hunters instead of just defenders. This allows them to proactively seek out the most hard-to-detect threats, build internal intelligence capabilities, construct better metrics and invest in operational risk analysis.
  • Ramp up for the Internet of (even more) Things: With past research showing 50 billion devices expected to be connected to the Internet by 2020, start working now on a policy governing connected devices — many of which are invisible to the end user — if your enterprise doesn’t have one now.

ISACA provides a wide variety of guidance to help business and IT leaders maximize value and manage risk related to information and technology.

Source: Mashable

Bohn Inc

Share
Published by
Bohn Inc

Recent Posts

50,000 Websites Hacked Through MailPoet WordPress Plugin Vulnerability

The users of WordPress, a free and open source blogging tool as well as content…

12 years ago

Media hackers behind E-toll billing problems: Minister

Minister of Transport Dipuo Peters has said that “some media houses” were responsible for “cyber…

12 years ago

After Takedown, GameOver Zeus Banking Trojan Returns Again

A month after the FBI and Europol took down the GameOver Zeus botnet by seizing…

12 years ago

Smart LED Lightbulbs Can be Hacked too; Vulnerability exposes Wi-Fi Passwords

Until now, we have seen how different smart home appliances such as refrigerators, TVs and…

12 years ago

How To Jailbreak iOS 7.1 And 7.1.1 Untethered Using ‘Pangu’ Jailbreak Tool

Quite Surprisingly, a team of Chinese hackers, Pangu have released an untethered jailbreak for iOS…

12 years ago

New Banking Malware with Network Sniffer Spreading Rapidly Worldwide

With online banking becoming routine for most users, it comes as no surprise that we…

12 years ago