5 Cybersecurity Lessons for 2012

Standing at the threshold of a new year, we can look back at what the main cybersecurity issues were in 2011 and which should ring true in 2012 as well, according to a report by www.govinfosecurity.com.

1. Breaches

The number of instances of data breaches was at an all-time high in 2011, with more of the same being predicted for 2012. And while the number of security breaches has increased, so has awareness of the inherent dangers of Internet security. Even though awareness is high, most people operate under the assumption that a security breach cannot happen to them. It will take more breaches, such as what happened at the Pentagon, Sony, and other high-profile companies, for the truth to finally settle in — the truth that we are all vulnerable and open to attack unless we take the necessary measures to ensure otherwise.

2. Responsibility

User responsibility is also an issue. While most of the blame can be laid at the feet of those who instigate cyber attacks, users should also share some of that responsibility for not adequately protecting their data. Ultimately, the responsibility for ensuring a company’s data security is up to date falls on top executives and those they appoint to see to such tasks. Holding them responsible for such failures is a step in the right direction toward ensuring proper data protection.

3. Trust

Internet security also requires trust between its participants and those who control it. If security is not sufficient to protect the data of those involved, then the ones in charge of making sure that data is safe will lose the trust of their constituents. Just like Sony, and the PlayStation Network breach of 2011, consumer trust was lost as the Sony network was breached. Further trust was lost with the way Sony then dealt with that breach.

4. Cyberwar

With the advent of Stuxnet against Iran’s nuclear weapons program, cyberwar moved from purely an online threat to a physical threat. Now, systems can be affected that are outside the digital world, leading to more deadly possibilities. Use of such viruses can even be seen as acts of war, with the physical implications of such an attack no less deadly than if a country’s facilities had been taken out with a cruise missile.

5. Risk

Even if a company knows where it needs to improve its security measures to forestall, or defeat, a cyber attack or breach, that does not mean all issues will be able to be addressed immediately. With ever-declining resources in trying economic times, most companies are delegated to determining which risks are the most pressing and dealing with them first, putting lesser risks on the back burner.

For more information about cybersecurity and how you can protect your business, visit: http://www.govinfosecurity.com/blogs.php?postID=1155