The 3 Most Vulnerable Technologies of 2012

Technology races forward faster and faster, becoming more sophisticated and better serving the world every second.  Unfortunately, as technology improves and makes life easier, hackers and other cyber-criminals who attack against security also grow more sophisticated, devising new and more sinister ways to break into our systems and wreak havoc from afar.

No matter how fast experts try to respond to threats from hackers, the offenders always seem to be one step ahead, leaving the victims to double back and patch old weaknesses, leaving emerging tech vulnerable.

The only way to prepare for a cyber attack is to think ahead of the hackers, and try to predict where they will strike next.  With that in mind, here are a few predictions about the most likely candidates for attack in 2012.

Virtual Environments
As any security vendor will know, virtual environments require a completely different set of policies than standard physical environments.  What companies usually do to solve this problem is to generate a completely new set of policies that is run concurrently with the physical environment, but managed by a separate vendor.  This leaves a gap between the physical and virtual environments — a gap that hackers are discovering and will exploit more aggressively in 2012.  Already having had minor issues stemming from this vulnerability, many companies are addressing it by consolidating their policies with one vendor, instead of dividing them between two.  Whatever companies do, they need to do something to keep themselves protected.

Mobile Devices
It probably goes without saying that as mobile technology improves, the threats against it will expand with it.  So we can reasonably expect a heavy attack on the mobile front.  Corporations are relying on mobile devices to store and deliver information, and employees are frequently conducting business on those same devices; if they aren’t managed and secured, the effects could be disastrous.

Similarly, as the commercial popularity of the big name mobile OS organizations (think Android and iOS), they become more and more enticing targets for virtual threats.  It is almost inevitable that hackers will eventually garner enough courage (or foolishness) to attack these giants, so they would do well to prepare, too.

Cloud Storage
Right now, there is some ambiguity built into the distinction between corporate cloud space and cloud-based tools that employees use on their business machines to get work done.  Again, this is a weakness that hackers will sniff out if it isn’t straightened out.

There will be threats against security as long as there is security, but if we can begin to think ahead of the offenders instead of always being on the defensive, we might be able to reduce the damage they are able to do.

Byline:
Jane Smith is a freelance writer and blogger. She writes about criminal background check for Backgroundcheck.org. Questions and comments can be sent to: janesmth161 @ gmail.com