By: Edward Kopp - PCIP
How many points of vulnerability do you have? As use of technology continues to expand, the “surface area” vulnerable to attack does as well. It is up to everyone (security professionals, business owners and individuals alike) to act responsibly in their deployment, operation and maintenance of the technology they own and/or use. According to the McAfee Labs 2016 Threat Predictions Report the following growth is expected over the next 5 years:
When you take the current volume of connected devices and data flow into consideration it is obvious why there is such a major need for security! Add the expected growth in technology balanced against the shortage of experienced security support resources; it becomes clear why each of us needs to share in the accountability for security. My family just installed an Amazon Echo™ in our home. This member of the “Internet of Things” is not a device type that I would have ever imagined owning 2 years ago. Even though there may not be vulnerability for this device at THIS time, I’ve still expanded the surface area for attack by adding yet another Internet connected device in our home.
As a consumer it’s up to you to make sure that you protect your own data by using it in a responsible fashion, being cautious what you share and with whom AND making certain that wherever you do business (whether "brick & mortar" or online), that the business respects the importance of securing any and all information that you provide.
0 Comments
|
Phoenix Dental ITProviding expert technical support to Dental Practices in the Phoenix Metropolitan Area Archives
April 2017
|