PRO+ Premium Content/Information Security

Thank you for joining!
Access your Pro+ Content below.
February 2017, Vol. 19, No. 1

Looming cloud security threats: How attacks will follow your data

It is almost certain that your social security number has been leaked in a breach. There's also a high probability that at least one of your credit card numbers will fall into the wrong hands over the next 12 months. In the past, attacks to steal such data represented lucrative and sustained criminal enterprises. But due to the abundance of stolen data, the value of individual records has plummeted, and many stolen records never get used. Criminals have had to find new ways to monetize their skills. They have turned to ransomware to increase the value of the information by selling it back to the victim. Now it's not just your identity at risk, but important business documents and, in some cases, critical medical data. Future attacks will combine many of the patterns we have seen recently, and criminals will continue to automate these attacks. They have already started taking advantage of the expanded use of network-connected devices and cloud-based systems to find new ways to threaten information security. Many industries ...

Features in this issue

Columns in this issue

Networking
CIO
Enterprise Desktop
  • Understanding how GPOs and Intune interact

    Group Policy and Microsoft Intune are both mature device management technologies with enterprise use cases. IT should know how to...

  • Comparing MSI vs. MSIX

    While MSI was the preferred method for distributing enterprise applications for decades, the MSIX format promises to improve upon...

  • How to install MSIX and msixbundle

    IT admins should know that one of the simplest ways to deploy Windows applications across a fleet of managed desktops is with an ...

Cloud Computing
ComputerWeekly.com
Close