Top 10 Security Trends for 2011

Data protection and information monitoring need to come to the forefront for data center officials in 2011 as organizations face increasingly complex and mobile security threats, a new vendor-backed analysis indicates.

WatchGuard Technologies, a data loss prevention and security provider, outlined the 10 top security threats and responses for information management organizations. In a news release, company vice president Eric Aarrestad called 2011 a “dynamic year for network security” as hackers accelerate their connections and abilities during a time of increased outsourcing and off-site data storage.

Malware-as-a-service and advanced persistent threats pose the greatest increase in danger to data centers across all industries, and particularly those with financial information or intensely personal data, like health care systems, says Corey Nachreiner, senior network security strategist at WatchGuard.

To combat these data dangers, organizations will concentrate on data recognition and detection, the company stated. Technologies expected to flourish to meet those threats involve increased network visibility and identification of existing threats in a network system, Nachreiner says.

“I am more afraid of the threat in my network I don’t see or know of than the ones I see my defenses blocking,” Nachreiner says. “In 2011, I think IT administrators will want to see more granular information about what is happening in their networks, good or bad.”

In addition, security perimeters around data centers will be bolstered as the possibility of mobile attacks grows, the company said.

Other threats listed by WatchGuard include: hacking into car computers; increase in government protection of intellectual property; more Web cyberwars; personal account intrusion through social networking sites; and growing VoIP scans and attacks.

To read more analysis on expected security threats in 2011, click here.

This story has been reprinted with permission from Information Management.

For reprint and licensing requests for this article, click here.
Security risk Analytics Data security Core systems Data and information management Policy adminstration
MORE FROM DIGITAL INSURANCE