Friday, April 3, 2015

Week 3 - Hackers Using Mobile Apps to Get Into Enterprises


“Each year, the Information Security Forum, a nonprofit association that researches and analyzes security and risk management issues, releases its 'Threat Horizon' report to provide members with a forward-looking view of the biggest security threats over a two-year horizon” (Olavsrud, 2014). Interestingly enough, one of the most interesting security threats that the Information Security Forum found was that mobile applications are now a huge target for cybercriminals and hackers because it typically offers them a way into the enterprise. (Olavsrud, 2014)

As more and more enterprises use mobile applications, they are exposing their selves more and more. The security of mobile applications is still not so great because of the rapid developmental processes involved. (Olavsrud, 2014) One important consideration is that the “ISF recommends you incorporate user devices into existing standards for access management, and that you begin to promote education and awareness of BYOx (Bring Your Own Anything) risk in innovative ways” (Olavsrud, 2014). It’s still outstanding to realize all of the threats that are still developing. I’m sure there is more to come on these types of threats.

References

Olavsrud, T. (2014, April 1). 10 Top Information Security Threats for the Next Two Years. Retrieved from CIO: http://www.cio.com/article/2368648/security0/149359-10-Top-Information-Security-Threats-for-the-Next-Two-Years.html#slide7



No comments:

Post a Comment