Directive Blogs
4 Security Threats to Lookout for in 2013
Technology can change in an instant. The popularity of mobile devises and tablets has grown exponentially in a very short amount of time. In fact, having a tablet, smartphone, laptop and desktop is not an unusual occurrence, especially for small and medium business owners who are, essentially, always on the clock. And so, it stands to reason that threats and security are also evolving along with technology.
McAfee recently released a document outlining the threats to security that are likeliest to manifest in 2013. Of course, these are just predictions However, that doesn't mean that it will not behoove you to keep your eyes peeled for these potential security issues.
Malware Shopping Spree with NFC Worms (Mobile Devise Threat) – The malware causes your phone to download applications used to purchases goods and services. After the installation is complete, a near-field communications (NFC) worm will steal the information from your digital wallet. NFC worm can be contracted when a smartphone user utilizes a 'tap and pay' application when making purchases.
Ransomware (Mobile Devise Threat) – Ransomware is a program that will, literally, highjack the information stored in your mobile device and then hold it hostage until you agree to pay the hijackers ransom for the safe return of your data. In the last six months of 2012, the amount of consumers reporting ransomware has gone from virtual non-existence to nearly 120,000 unique reports of the threat.
Large Scale Attacks (All Devises) – In the past few years, there has been a growing trend of targeted maleware and worms that were created for the sole purpose of causing as much chaos and destruction as possible. This maleware is a potentially devastating occurrence for SMBs. Implementing a good backup and disaster recovery (BDR) service is a great place to start when avoiding massive data loss.
Hacking as a Service (All Devises) – This isn't the 'HaaS' you're used to. This concept stems from chat rooms and forums designed so that cybercriminals can network and partner with other criminals. Hackers and other cybercriminals can join exclusive clubs or groups that require proof that you're a legitimate criminal. Once you're accepted into the group, you can buy and sell software as well as trade your services with other hackers.
These four threats are just a fragment of the cyber danger that exists and grows every day. When it comes to protecting your business, the best defense is a great defense. Contact Directive at 607-433-2200 to discuss security suites, backup and disaster recovery and other ways to protect your company.