Industry experts believe that companies that provide essential services, such as data centers and cloud providers, will continue to be targets of cyber threats. Here, they offer perspectives on governance and data security in data centers and cloud environments.
- IIn the future of cloud computing, security will be at the forefront as cyber threats grow: As cyberthreats grow, organizations are increasingly adopting a hybrid and multi-cloud approach to mitigate the risk of vendor concentration. With data protection at the top of the list, businesses will also prioritize security designed with a single point of control so they can access a holistic view of threats and mitigate complexity over the coming year. . If businesses are planning for 2022, they also need to think about preparing for an even longer future. As quantum computing grows stronger and poses potential risks, such as the ability to quickly break encryption algorithms and gain access to sensitive data, businesses must look beyond short-term threats in 10, 15 and 20 years old. –IBM
- Insider threats represent a new challenge for organizations as the job market continues to change: As the Great Resignation took shape, we saw increasing challenges associated with insider threats. The large number of employees leaving their jobs and potentially still having access to the network or to proprietary data has created a headache for the IT and security teams tasked with protecting the organization. Insider threats have become a separate new challenge for organizations as they attempt to balance staff turnover, employee onboarding, and the use of unauthorized applications and platforms. In 2022, I think we will see the number of insider threat incidents increase. Attackers will also start targeting employees to carry out attacks or install ransomware. As a result, we’ll see new protocols and guidelines established as organizations work to protect sensitive networks and data. –Rick McElroy, Senior Cyber Security Strategist, VMware
- A New Mindset About Security, Suppose You Are Under Attack:The acceleration of digitization has led to a proliferation of unmanageable systems including servers, data centers, VPNs, and more. Ultimately, a best practice, especially for large organizations, is to operate under the assumption that you have already been compromised. Businesses need to redesign their strategies around whether they “are” attacked rather than “if” they are attacked. The threat is much more immediate these days. –Ambuj Kumar, CEO and co-founder of Fortanix
- The rise of DDoS / ransomware-as-a-service offers accelerates the cybercrime ‘business’: Cybercrime has become a lucrative and mature market. As a result, we will see stronger strains of existing well-known malware and refined attack strategies emerge, as the targets become increasingly ambitious. Public infrastructure and large private companies that provide vital services, such as cloud providers or data centers, will likely remain at the top of the target list, as the risk of potential ripple effects of an attack (interruptions that affect customers) adds an additional incentive for them to pay. Organizations must implement an “always on” approach to network security to ensure rapid and automated responses to attacks, and they must partner with security providers who continually evolve their defense capabilities. These new best practices prove to be much more profitable in the long run and will bring peace of mind to organizations. –Carlos Morales, SVP Solutions, Neustar Security Services