CYBERSECURITY: MANAGING THE COMPLEXITY
Advanced computing power and anywhere connectivity are in the palm o ourhands, literally. Business devices connect us to smartphones, digital two-wayradio systems and location-based asset management systems that helpmobile workers keep in touch with the home oce. Digital cameras uploadimages to the cloud, gaming systems let us compete with players anywherein the world, and smartphones turn on lights and appliances remotely.Anywhere connectivity has changed our expectations about the way weaccess inormation at work. Telecommuting is mainstream. Mobile data ismission-essential. Twitter and Pinterest are moving rom social media tobusiness tools. Centralized network lockup has become impossible. Anddata is growing aster than the ability o the network to handle it – with 667exabytes travelling over the Internet annually by 2013, according to Cisco.
At the same time, employees are bringing their own devices to work andexposing enterprise networks to a new world o vulnerabilities. People aremore procient than ever with technology and more dependent on theirmobile devices. Unortunately, most are naïve about their role in securing thedevices and data you rely on – and that is an enormous risk.
MOBILITY IS CHANGING EVERYTHING,ANDCHALLENGING EVERYONE
GOVERNMENT NETWORKS: HOT TARGET FOR HACKERS
Hackers are targeting government networks as they go ater high-value intellectual property, andincreasingly their attacks originate in oreign countries. A highly specialized worm, such as the Stuxnetcomputer virus, is a sophisticated cyber attack tool that shut down a nuclear acility’s entire networkand is now viewed as a super weapon.
EXABYTES OF DATATRAVELLING OVER THEINTERNET ANNUALLY,DATA USAGE IS GROWINGFASTER THANTHE NETWORKCAN HANDLE