Scenario for Information Security in 2015
Last year was marked by major vulnerabilities that resulted in the growth of discussion on the Security sector information. And in 2015, the attention to the issue should be higher, because the struggle between cybercriminals and professionals to protect companies and users from cyber attacks will continue even stronger and this in fact of all.
Therefore, one of the factors that should arouse the attention of companies is increasing DDoS (denial of service), due to the increasing number of compromised Unix servers and the wide bandwidth achieved in these offensives. This year, these initiatives will be increasingly common and may be more intense, which will involve the operation of computers, services and any Internet-connected device. And with them, cybercriminals can compromise from governments, organizations and ordinary users; to take advantage of vulnerabilities for financial gain.
Moreover, this year, we will also see the progress in learning machines, which will further use Big Data to create new solutions against cyber attacks. With this new platform, companies can, rather than react attacks, change the cyber security scenario, since it will help in preventing online threats. This change can cause a drop in the impressive amount of information lost annually – only in 2013, for example, more than 552 million expostas1 identities.
In addition, we will also have companies and technologies acting increasingly intense against attacks. In 2015, we will have a growing global partnership between the security industry with telecommunications providers and governments to combat cybercrime, which will support the defense of the most diverse data.
It is therefore essential that companies and users worry increasingly about protecting your data. I therefore recommend the following safety tips for all to ensure a safer year:
- Always use strong passwords with about 8 characters, with letters, numbers and symbols and never reuse on other sites.
- Only allow remote administration of the devices from the Internet if it is really necessary;
- For developers: Block redirects on your site, not to infect users;
- Never click on suspicious links that arrive via email, social networks and SMS;
- Use security software to protect all the devices connected to the Internet against cybercriminals.
1Dado the Threat Report Internet Security, conducted by Symantec in 2014.
Full article: http://corporate.canaltech.com.br