itb-nz logo
Story image

2014… time to address cyber security time bomb

30 Nov 2013

Keeping business systems safe and protecting the data that they hold has never been more difficult to achieve, according to global analyst firm Ovum.

It is a commitment that continues to be threatened by security attacks ranging from opportunistic hackers using pre-built tools through to targeted, well-resourced, state-sponsored cyber activity.

According to Ovum’s latest Security 2014 Trends to Watch report*, attack volumes will continue to rise and no business should consider itself immune; any type of organisation can be targeted.

Even the best-protected government, military and business systems have already been breached, and in 2014 they will to be put under further pressure.

Security 2014 Trends to Watch:

• More proactive protection is needed to address the cyber security time bomb.

• Security-as-a-service will be the way forward for a growing number of organisations.

• Cloud and mobility will change the way we approach IT security and user protection.

“In 2014, cyber espionage and state-sponsored threats will continue to make headlines, but the concerning underlying trend is that similar technology can and will be used against ordinary businesses," says Andrew Kellett, Principal Analyst, Software – IT solutions and author of the report.

“Security experts recognise the rise in use of sophisticated malware, and this is driving the need for better and more proactive security.

"But organisations will be required to fundamentally shift their approach to security from a mainly static defensive posture to one of taking positive action before or as an attack takes place.”

In 2014, Kellet claims that enterprise organisations will need to gain positive advantages from security intelligence, Big Data analytics, and the ability to understand threat priorities and the actions needed to sustain the well-being of the organisation and its users.

“Not every organisation has the budget or security resources to meet its current protection requirements, let alone the extended use of cloud-based services and the BYOD-driven use of smartphones and tablets by employees.

"Therefore, organisations will be forced to consider the practicalities of managed, security-as-a-service options.”

Ovum believes the need for better security will be driven by operational demands, including the use of technology that makes business information more readily available and consequently more vulnerable to cyber-attacks.

Increasing use of cloud-based services, user mobility and multiple devices is adding complexity to security, particularly identity management requirements.

“Ovum recommends that organisations should look to gain positive advantages from Big Data, security intelligence and analytics-based approaches to security management," Kellet concludes.

"Meanwhile, mainstream security vendors need to provide a range of products and services that genuinely meet the protection needs of both SMEs and large enterprise clients."

Story image
Video: 10 Minute IT Jams - Who is OutSystems?
In this IT Jam, we speak with OutSystems vice president for A/NZ Paul Arthur, who discusses the company's role in the A/NZ region, how things have changed for the company and the industry amid pandemic, and what he sees in the future of visual development and digital transformation.More
Story image
Q&A: StorageCraft director on how backup and recovery has changed in 2020
Techday spoke to StorageCraft international product marketing senior director Florian Malecki, who discusses the importance of backup and recovery, the products and solutions that StorageCraft offers in this field, and the revenue opportunities partners can capitalise on. More
Story image
Snowflake announces updates geared towards data mobilisation
"The new features announced today are another example of Snowflake's commitment to delivering the technology customers need to fully mobilise their data and achieve meaningful business value.”More
Story image
IDC names ESET a Major Player second year running
“ESET is strong in the areas of threat research, especially around Android malware identification and behavior detection.”More
Story image
BlackLine enhances support for finance and accounting teams
“The global pandemic is bringing to the forefront what we’ve seen for years.  Traditional manual accounting processes are not sustainable."More
Story image
New Zealanders more willing to share location data following COVID - report
Use of location data by government agencies is broadly preferred over private companies.More