By: Edward Kopp - PCIP
How many points of vulnerability do you have?
As use of technology continues to expand, the “surface area” vulnerable to attack does as well. It is up to everyone (security professionals, business owners and individuals alike) to act responsibly in their deployment, operation and maintenance of the technology they own and/or use.
According to the McAfee Labs 2016 Threat Predictions Report the following growth is expected over the next 5 years:
When you take the current volume of connected devices and data flow into consideration it is obvious why there is such a major need for security! Add the expected growth in technology balanced against the shortage of experienced security support resources; it becomes clear why each of us needs to share in the accountability for security.
My family just installed an Amazon Echo™ in our home. This member of the “Internet of Things” is not a device type that I would have ever imagined owning 2 years ago. Even though there may not be vulnerability for this device at THIS time, I’ve still expanded the surface area for attack by adding yet another Internet connected device in our home.
As a consumer it’s up to you to make sure that you protect your own data by using it in a responsible fashion, being cautious what you share and with whom AND making certain that wherever you do business (whether "brick & mortar" or online), that the business respects the importance of securing any and all information that you provide.
How many points of vulnerability do you have?
As use of technology continues to expand, the “surface area” vulnerable to attack does as well. It is up to everyone (security professionals, business owners and individuals alike) to act responsibly in their deployment, operation and maintenance of the technology they own and/or use.
According to the McAfee Labs 2016 Threat Predictions Report the following growth is expected over the next 5 years:
- Technology Users: 3.0 Billion users in 2015 / 4.0 Billion Users by 2020 (+ 1.0 Billion)
- Smartphones: 3.3 Billion in 2015 / 5.9 Billion by 2020 (+ 2.6 Billion)
- IP Connected Devices: 16.3 Billion in 2015 / 24.4 Billion by 2020 (+ 8.1 Billion)
- IP Traffic Per Month: 72.4 exabytes in 2015 / 168.0 exabytes by 2010 (+ 95.6 exabytes)
When you take the current volume of connected devices and data flow into consideration it is obvious why there is such a major need for security! Add the expected growth in technology balanced against the shortage of experienced security support resources; it becomes clear why each of us needs to share in the accountability for security.
My family just installed an Amazon Echo™ in our home. This member of the “Internet of Things” is not a device type that I would have ever imagined owning 2 years ago. Even though there may not be vulnerability for this device at THIS time, I’ve still expanded the surface area for attack by adding yet another Internet connected device in our home.
- Take a second and think back…
- Start with your FIRST cell-phone, tablet or other device that connected to the Internet…
- Since that time, what else have you added in your personal life (or at work) in the way of technology? Each and every device connected to a network (or the Internet) is part of your “Cyberattack Surface”. Game Consoles, GPS Devices, Smart TVs, Smart DVDs, Smart Watches, Security Systems, HVAC Systems, Connected Refrigerators, Connected Automobiles, Cloud Data Storage, Web Based Applications, etc. are all examples of things you may be using that increase the surface area susceptible to Cyberattack.
As a consumer it’s up to you to make sure that you protect your own data by using it in a responsible fashion, being cautious what you share and with whom AND making certain that wherever you do business (whether "brick & mortar" or online), that the business respects the importance of securing any and all information that you provide.