(ID999) INCIDENT RESPONSE - Tel: UK 0044 1732 897 601

Popular Trend & 2013 Projections

BII experts say - 2012's breaches will define 2013

As the use of mobile devices increased in 2013, malware and data breaches caused more havoc with individuals privacy. Cyberspace and the internet will continue to suffer from poorly-written and governed code. BII experts predict lessons from 2012 will go somewhat unlearned in 2013 due to IT governance financial cutbacks and a shortage of man power and skills.

Privacy and data breaches

Information security data mining awareness increased in 2012 mainly in the area of personal privacy settings. This was brought on by numerous mainstream websites such as Facebook, Google, and Instagram capturing your data via trendy mobile app policies. Many organisations have not invested in tier one (best of breed vendor technology) database protection layers. Due to global media attention, personal privacy will remain a key security topic throughout 2013.

Holistic security

One trend that's impossible to deny is that today's cyber threats start in rapidly evolving realms, but the nature of the internet is making them more intertwined than ever before. Malicious software (Malware) writing techniques pioneered for the Stuxnet cyber-warfare virus inspire consumer-targeted malware writers, who in turn are forced to develop new social engineering techniques. It is the app stores, browsers, and website owners that suffer due to vulnerabilities and zero-day exploits.

As much as we don't want to admit it, security is becoming an issue of on-going education and awareness. BII is concentrating heavily on educating board members and the general public through 2013.

Sophos unveils thirteen IT security trends for 2013

The following report provides a baseline of what all organisations should be prepared for in coming year according to Sophos.

December 21, 2012 – Sophos has released its Thirteen Trends for 2013 report, developed by James Lyne, director of technology strategy. Lyne anticipates the IT security industry will experience a continuation of trends present in 2012, and this report provides a baseline of what all organizations should be prepared for in the coming year.

Trends for 2013

  1. Attack toolkits will continue to proliferate
  2. Modernisation and hardening of OS's
  3. Cloud-based malware testing will change the threat protection model
  4. An increased focus on layered security
  5. One step forward, two steps back in technology adoption
  6. Mobile attacks will become more advanced
  7. Web servers will be back in the crosshairs
  8. Further integration of devices, applications and networks
  9. Increasingly diverse business models and irreversible malware
  10. Skills problem will become more apparent
  11. Cyber criminal anti-forensics will become more prevalent
  12. More advanced hacktivism and political debate
  13. Arguments will continue over big data vs. analytics and confusion

Security Threat Report 2013

Sophos recently released its Security Threat Report 2013, a comprehensive assessment of IT security happenings in 2012, including a look ahead at what's expected in 2013 including trends from 'bring your own device' (BYOD) to the increasing adoption of and uncertainty around the cloud to countless other security challenges faced by organisations of all sizes.

For more information about each trend, please see the full report here

2002 - 2013 Technology trends and calculated predictions

BII Compliance has investigated, designed and implemented efficient layers of defence to protect against current and emerging threats since 2002. BII relies on tier one and tier 2 technology vendors to deliver the very best solutions available in the cyber security market. BII's consultants are trained extensively and will work with your technical requirements to advise the best possible software, hardware or managed service.

We believe we are in a unique position to best direct the future interest of clients and their security environments as well as consulting them when required or called upon to do so. Using our internal client relationship management system (CRM) it has proven possible to correlate future project trends in all sectors and vertical markets. BII consultants are in daily touch with security teams, risk managers and governance officers who provide us with quarterly concerns and projects. BII use this data to predict future trends in the technology market as well as enablement of thought leadership and entrepreneurial services.

Appointing BII as your cyber security partner (CSP) adds additional layers of intelligence which an on-premise team of experts dedicated to protecting your organisation simply could not.