Private Clouds, Cyber-security, Privacy: ISACA Issues Guidance on Top 2013 TrendsAdded 20th Dec 2012
ISACA, a non-profit global association of more than 100,000 IT audit, security, risk, and governance professionals, released guidance on managing three top trends expected to pose major challenges to Indian businesses in 2013: Private vs. public clouds, cyber-security threats, and data privacy.
Debate over Private vs. Public Cloud
Over the next 12 months, information security concerns will prompt a growing interest in private or hybrid (public/private) cloud solutions. The expected rise of “personal clouds” will add to the challenge of protecting data across multi-platforms. Cost, speed, manageability, and security are the factors most debated in cloud computing.
ISACA’s 2012 IT Risk/Reward Barometer shows that IT professionals remain wary of public clouds; 64 percent believe that the risk of using public clouds outweighs the benefit.
At the same time, it was highlighted that 66 percent of respondents in India believe that the private cloud has its own benefits which overcome the possible risk factors. This finding showed that respondents believe the benefits of private cloud far outweigh the risk, when compared with other cloud platforms, such as hybrid (17 percent) and public (15 percent) cloud platform.
The survey also highlighted that 31 percent of respondents have deployed private cloud for mission-critical services, compared to public cloud (6 percent) and hybrid cloud (7 percent). At the same time, for low-risk, non-mission critical services, enterprises are bullish on deploying public cloud (26 percent), compared to private cloud (22 percent) and hybrid cloud platform (23 percent).
Increasingly Sophisticated Cyber-security Threats in India
Viruses that send unsolicited e-mails and attack web sites, as well as search engine poisoning—where unwitting users are misdirected toward questionable or fraudulent sites—are among the increasingly sophisticated tactics used to capture and exploit consumer data and pose threats to international supply chains.
Due to phishing scams and social engineering attacks, clicking on an e-mail link from a work-supplied computer or smartphone presents a high risk to enterprises, say 56 percent of IT professionals in India.
Avinash Kadam, advisor, ISACA’s India Task Force, says, “With the growing number of cyber threats, it is critical for enterprises to safeguard their information assets. Addressing cyber issues should be considered beyond defining internet policies. It is equally important for enterprises to educate their employees on information risks, as it is not just an IT issue, but also a business issue.”
To address the growing cyber-security concerns in India and throughout the world, a team of ISACA members is dedicated to researching cyber-security issues and developing guidance to help enterprises protect their information assets. ISACA recommends that management address cyber-crime across all areas, including:
• Incident and crisis management
• Cooperation with investigating organizations
Growing Privacy Concerns
In the coming year, IT professionals will have to manage not just threats of data leakage and identity theft, but also growing consumer and employee concerns about data privacy.
Niraj Kapasi, IT auditor and chair of ISACA’s India Task Force, says, “Enterprises in India should be conscious that data protection goes beyond securing servers at datacenters or office premises. With the growing number of cyber threats globally, information risk can come from existing employees, customers, industrial surveillance by competitors, hackers, organized crime, and even foreign governments.” He added, “It is important for business leaders to govern privacy, evaluate the risk around privacy, ensure proper security management and effectively govern sensitive information.”
Enterprises can use the COBIT 5 framework to govern their information and systems. The framework publication is available as a free download at www.isaca.org/cobit.
According to CIO research, more CXOs and LoBs are directly sourcing IT from vendors, despite the fact that IT leaders are trying to work more closely with them.
Padmaja Alaganandan, Executive Director-Consulting, PwC Consulting, says the way Indian companies look at their workforce will change: The middle and lower rungs will be hired on a project- or part-time basis.
The annual cost of cybercrime is either staggering, or a mere blip on the world's economic bottom line, depending on how you look at it.
The idea of devops is to better streamline the work of developers and operation professionals.
Wireless broadband subscriptions now outnumber people in seven countries as consumers continue to snap up smartphones and tablets, according to a new report.
Former Microsoft CEO Steve Ballmer's 'devices and services' strategy may be in tatters, discarded by his successor, Satya Nadella, but Ballmer must be smiling all the way to the bank.
In today's increasingly converged world, there's a tendency to pit CIOs and CMOs against one another as if they're standing in opposing corners of the ring.
'Gyges' malware shows ominous mixing of forms.
Banks across Europe are now coping with a wave of cybercrime in which crooks are transferring funds out of customer accounts through a scam involving bypassing some two-factor authentication systems to steal large sums, according to a security firm assisting in the investigation.
Packer and OpenNebula are the latest open source technologies to find a home on the Microsoft Azure cloud service.
Let us do the heavy lifting when it comes to delivering consumer data, Oracle says.
After much preparation, the attackers launched very specially tailored spear phishing email attacks.
Today's businesses can't run without computers, but not every user needs a high-end tablet, laptop or tower.
Sells Junos Pulse to private equity firm for $250 million.
Apple has racked up another hugely profitable quarter on sales of iPhones and Macintosh computers, though its revenue growth was slower than expected.