Social networks and mobile platforms have made the software you use more vulnerable. Attackers have nearly unlimited time, skills and resources to exploit the vulnerabilities. Keep on top of what threats are developing. To monitor for unknown threats, develop heuristics that can detect unusual code or activity. Develop baseline metrics; monitor for unusual spikes in network activity or traffic destinations.