Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
0Activity
0 of .
Results for:
No results containing your search query
P. 1
CenturyLink WP Can Your Security Keep Up With 70K Strands of Malware 171

CenturyLink WP Can Your Security Keep Up With 70K Strands of Malware 171

Ratings: (0)|Views: 0|Likes:
Published by sumit8510

More info:

Published by: sumit8510 on Jun 23, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

12/21/2012

pdf

text

original

 
©2011 CenturyLink, Inc. All Rights Reserved.Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. WP101111 08/11
Can Your Security Keep Up With70,000 New Malware Strains a Day?
Get Ready for Top 2012 Security Trends: Smartphones, Social Media and the Cloud
IT security has never been simple, but the challenges youace now are more complex than ever. More than hal oemployees use their own mobile devices or business,and mobile malware is surging. Social technologies arenow vital business tools—and a popular vector or spamand phishing. Cloud computing oers new models orgrowth and innovation but complicates data protection.Forrester Research Inc. ocused on these challenges inits 2011 security strategy report,
1
and heading into 2012,they continue to dominate an evolving security landscape.
 
How can you keep up with thesemoving targets?
You can’t simply lock everything down. As Forresternoted in its report, “Empowered employees can’t waitor a two-month risk assessment or adhere to policiesblocking legitimate use o social media or limiting theiroptions or mobility just because the security team can’tnd a solution or them.”Peter Brecl, CenturyLink product manager and securityspecialist, says, “The challenge is always giving users thefexibility to work eectively while mitigating the risk oexposure you have by allowing that fexibility.”Malware and the malicious websites that distribute itthrough phishing and spam are still top concerns. And,in many cases, malware nds its way in through theapplications users rely on every day: Internet browsers,Java, and Adobe Flash and Acrobat Reader are among themost popular vehicles. But Brecl said the most signicantchange in 2011—which will only intensiy in 2012—is theprolieration o malware targeting mobile devices.
Smartphones: the mobile malware threat
•
Nearly 40% o large businesses now considersmartphones the device type posing the largestsecurity threat.
•
Malware targeting the Android operating system hasincreased 400%.
•
85% o smartphone users are not employing anantivirus solution to scan or malware.
Source: Juniper Networks
6
6 million+
unique malware samples wereidentified in the first quarter of 2011, a 26%increase from Q1 of 2010 and far exceedingany first quarter in malware history.
2
 
70,000
new malware strains are detectedevery day.
3
54% of employees
use their own mobiledevices for business purposes.
4
34 million
information workers have installedunsupported software in the past year.
1
63% of businesses
in one recent study saidemployees’ use of social media puts theirorganization‘s security at risk.
5
 
©2011 CenturyLink, Inc. All Rights Reserved.Not to be distributed or reproduced by anyone other than CenturyLink entities and CenturyLink Channel Alliance members. WP101111 08/11
Until the last ew years, the BlackBerry, with its robustnative security eatures, was the de acto standard orcorporate use. Today, your users may be just as likelyto use Apple iPhones and Google OS-based Androiddevices—both or business and personal use.“The majority o malware right now is being developedor Android-based mobile devices, with the second mostpopular being iOS devices,” Brecl said, although Apple’smore rigorous application approval process provides abit more o a barrier. “But at the end o the day, largebusinesses don’t care about the device itsel. Even a $500handset is immaterial compared with the value o the datastored on it i it gets in the wrong hands.”Protecting the data users access, store and share viamobile devices requires a combination o security solutionsand user policies. Brecl recommends these our steps toprotect data on mobile devices:1. Tightly control what can be installed on mobiledevices.2. Install anti-virus and anti-spam on every device.3. Detect and prevent installation o known malware.4. Protect data on lost or stolen devices:
•
Enorce use o security PINs to control access.
•
Encrypt sensitive or proprietary data.
•
Use management capabilities to “remote wipe” data.
Social media: preying on trust
Social media has evolved to become a vital part o yourbusiness toolkit. Sure, employees are checking Facebookon their lunch break, but they’re also using social tools toanswer customer support calls, collaborate with colleaguesand partners, and seek user input or new productinnovations.
•
60% o employees use social media or personalreasons at least 30 minutes per day.
•
42% spend that much time on social media orbusiness purposes.
•
52% o organizations experienced an increase inmalware attacks as a result o employees’ use osocial media.
•
29% say they have the necessary security controlsin place to mitigate or reduce the risk posed bysocial media used in the workorce.
Source: Ponemon Institute
5
In addition to external social networks, your company’semployees may share links on internal platorms such asSalesorce Chatter or an instant messaging application. “II send you a link, you’re going to click on it because it’s romme—someone you trust. In the case o social networks, thebad guys count on being able to compromise someone’saccount and then utilize that trust to get you to click,”Brecl said.Even i a link really does come rom a trusted riend orcolleague, it doesn’t mean the content is sae. In act,it’s estimated that about 80% o websites inected withmalicious code are actually legitimate sites. That’s whyit’s important to protect your network with Web contentltering, which enables you to limit user access to certainwebsites, either because they violate company policies orbecause malware has been detected. “Nothing is 100%ool-proo,” Brecl said. “But it’s better than just trustingblindly.”
Cloud services: securing thevirtualized rontier
As you consider moving business-critical applications tothe cloud, security is bound to be top o mind. Althoughit trails other concerns, such as device thet, mobility andIT consumerization, only 40% o business and technologyleaders in a recent IDG survey
7
are “extremely or verycondent that their security inrastructure is prepared toprotect data in the cloud.”According to the IDG report, preventing data leaks is the topcloud concern, ollowed by managing access to data anddetecting and preventing intrusion.Visibility into your data is essential. “In a corporateenvironment where you could walk down and touch yourserver, you had the tools to provide a great deal o visibility,”Brecl said. “As you move into the cloud environment, theneed or that visibility does not go away.”As companies like yours balance cloud security issues withthe potential business benets, one approach is a hybrid

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->