Home Top 5 Trends in Network Security

Top 5 Trends in Network Security

Over the weekend, Twitter was hit with a malicious worm, the second worm attack the site experienced in over a week. It’s no surprise, perhaps, that the rise of social networks have given cyber-criminals a whole new realm in which to wreak havoc. While many people have learned to not open suspicious-looking files, clicking on links via Facebook friends and Twitter followers seems to be yet another area in which a better understanding of security needs to be taught.

The social element has always been one of the weakest links in security. In other words, no matter the technological protections, human behaviors can be terribly insecure, as an experiment at Defcon this summer demonstrated (every company participating in a security contest had one of their employees hand over security data). So arguably, this social piece – the encouragement and expectations that we all “share” – may create even more vulnerabilities as social networks grow.

But that social piece isn’t the only challenge to network security. Here is a list of 5 more security trends that companies will face in coming months:

  1. The emphasis will be on protecting information, not just systems: As consumers and businesses alike move to store more and more of their important information online, the requirements for security will go beyond simply managing systems to protecting the data these systems house. Rather than focusing on developing processes for protecting the systems that house information, more granular control will be demanded – by users and by companies – to protect the data stored therein.
  2. Tackling myths about security and the cloud: One of the reasons consistently given for not moving to the cloud is fears about security. As cloud computing continues its adoption, both vendors and customers will have to better understand the questions to ask and the services to provide in order to maintain security.
  3. New platforms and new devices will create new opportunities for cybercriminals. Security threats have long been associated with personal computers running Windows. But the proliferation of new platforms and new devices – the iPhone, the iPad, Android, for example – will likely create new threats. The Android phone saw its first Trojan this summer, and reports continue with malicious apps and spyware, and not just on Android.
  4. Malware will appear on “reputable” sites. No longer is it simply “sketchy” website that are poised to infect users’ computers, as sites like the New York Times find themselves hosting malware. As computer users have become more savvy about email scams, some scammers are starting to purchase advertising on reputable sites instead.
  5. “Old” threats still pose a risk. Although SQL-injections, cross-site-scripting, and vulnerabilities in various applications are not new, they continue to be one of the main entry points for attackers gaining access to networks and data.

The pressure will be on for companies to move quickly to respond to these vulnerabilities. Although new techniques are constantly being developed, many organizations still have much to do in order to secure themselves from older threats to their networks. And as always, the human element – the people who click on strange links, via Direct Message, via email, or via web advertising – will be the biggest hurdle for organizations to overcome.

Photo credits: Flickr user Scott Davidson

About ReadWrite’s Editorial Process

The ReadWrite Editorial policy involves closely monitoring the tech industry for major developments, new product launches, AI breakthroughs, video game releases and other newsworthy events. Editors assign relevant stories to staff writers or freelance contributors with expertise in each particular topic area. Before publication, articles go through a rigorous round of editing for accuracy, clarity, and to ensure adherence to ReadWrite's style guidelines.

Get the biggest tech headlines of the day delivered to your inbox

    By signing up, you agree to our Terms and Privacy Policy. Unsubscribe anytime.

    Tech News

    Explore the latest in tech with our Tech News. We cut through the noise for concise, relevant updates, keeping you informed about the rapidly evolving tech landscape with curated content that separates signal from noise.

    In-Depth Tech Stories

    Explore tech impact in In-Depth Stories. Narrative data journalism offers comprehensive analyses, revealing stories behind data. Understand industry trends for a deeper perspective on tech's intricate relationships with society.

    Expert Reviews

    Empower decisions with Expert Reviews, merging industry expertise and insightful analysis. Delve into tech intricacies, get the best deals, and stay ahead with our trustworthy guide to navigating the ever-changing tech market.