PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
February 2017, Vol. 19, No. 1

Looming cloud security threats: How attacks will follow your data

It is almost certain that your social security number has been leaked in a breach. There's also a high probability that at least one of your credit card numbers will fall into the wrong hands over the next 12 months. In the past, attacks to steal such data represented lucrative and sustained criminal enterprises. But due to the abundance of stolen data, the value of individual records has plummeted, and many stolen records never get used. Criminals have had to find new ways to monetize their skills. They have turned to ransomware to increase the value of the information by selling it back to the victim. Now it's not just your identity at risk, but important business documents and, in some cases, critical medical data. Future attacks will combine many of the patterns we have seen recently, and criminals will continue to automate these attacks. They have already started taking advantage of the expanded use of network-connected devices and cloud-based systems to find new ways to threaten information security. Many industries ...

Features in this issue

Columns in this issue

Networking
CIO
Enterprise Desktop
Cloud Computing
ComputerWeekly.com
Close