|  June 18 2012  |   Blog   |   0 COMMENTS

Imagine waking up in the middle of the night with the burglar alarm blaring, your father cautiously walking by your room with a baseball bat, looking to protect his family, and your mother on the phone with the security company, trying to get the cops on premise. When I was ten years-old, this is the exact scene that was happening in my house, and it was the first time that I realized that others might want to cause harm to our family, and it was a vulnerable feeling.

The topic of security has been a significant trend in the IT industry as of late, and a few scary questions have come to mind. First, what are businesses doing to ensure that customers’ private information is safe? Can we trust that the current technology being used to secure our data is actually state-of-the-art? Is there a strategy in place to protect against possible breaches?

I have learned that protecting your private valuable and tangible possessions in a house is much more difficult than information on the Internet. For example, a house is a physical structure with minimal areas for possible point of entry. In this case, my father had wired the house with motion detectors, inserted bolt locks on the front and back entrances, and purchased a top-notch security system that linked directly into the police station to ward off any intruders. However, the Internet is an entirely different beast for consumers and businesses alike, and, as a fluid technology, there are numerous points of entry with which businesses are clearly struggling to manage.

In the recent May issue of InformationWeek, the magazine released its 2012 Strategic Security Survey, which technology companies use as a benchmark to understand the recent security trends in the market. The survey revealed that year-after-year, due to the adoption of emerging technologies; businesses are more likely to leave their infrastructure exposed to new forms of attack. Cloud Computing implementation and Big Data concepts have become the hot technology topics that have made major impacts on the way in which companies conduct business, and implementing these technologies into the data center is an entirely different set of challenges than the new technologies from previous years.

For example, when trying to protect against threats to the cloud, it is imperative that there is a secure software development life cycle process. However, only one-third of the respondents to the InformationWeek survey were found to have a process in place. Additionally, as data continues to grow, up to 44 percent of IT directors fear they are at risk of losing information and sensitive data. In just in the past two weeks, hackers broke into LinkedIn and posted users’ passwords online, and a well-known group called LulzSec Group possibly broke into Twitter to accomplish the same feat!

The ability to secure all types of information is very difficult, and, as technology progresses, IT directors need to know how to handle any crisis, and calmly navigate and communicate with customers to solve any looming issues.

* Image from California State University Dominguez Hills

 

, , , , , , | Blog
Leave a Reply
Name*
E-mail*
Website*
Message/Comments