Page 5 - Feb 2014
P. 5
RESEARCH, ANALYSIS & TRENDS





The shareconomy requires secure

exchange of data




"Shareconomy" was the motto of
the CeBIT last year, the world’s
largest international computer show
that will open its doors again next
month in Hanover, Germany. What
it describes in a condensed matter
is the sharing of information which
quite obviously requires a secure
exchange of data and good solu-
tions to fight viruses, worms and
malware.

Risks for companies

Closely linked to shareconomy is
the breakthrough of cloud applica-
tions in almost all aspects of our
digital life, providing significant
problems and opportunities for the
identity and access management have outdated operating systems Just take a look at the current
(IAM) industry, as it is a disruptive that are full of security holes. cause of alarm regarding Windows
technology that is challenging the XP which has been around since
status quo within the IAM sector. 2001. For years now, Microsoft has
Fact is that almost 80% of busi- At the same time the sharing of been warning its customers about
nesses already make some use of information has also affected the the April 8, 2014 cut-off deadline for
cloud services and that strategic as energy market. With smart grids Windows XP security support. After
well as ad hoc adoption of cloud and smart meters, consumption that day, XP systems could be ex-
facilities is on the rise. data are continuously exchanged,
making new security solutions nec- ploited more easily by malware, so
essary. the Windows XP shutdown is right
And there is another trend apparent now even forcing some large com-
at the center of cloud computing panies, banks and government
and the shareconomy right now: Risks for individuals bodies to ask for emergency IT
“Bring Your Own Everything” as an support until they find an alternative
extension of the BYOD phenome- The security risks for consumers solution as they forgot to prepare
non. Therefore in the future, com- shouldn’t be underestimated either: accordingly.
panies need to train their employ- Today’s consumers have a variety
ees more in dealing with infor- of Internet-enabled devices at their Let’s not talk about Windows 8,
mation and set binding rules. Spe- fingertips and use them extensive- Microsoft’s new operating system
cial attention needs to be paid to ly, depending on the location and that provides a common platform
mobile security, as smartphones occasion, down to their whim for for tablets, smartphones and desk-
and tablets allow users not only photos, chats, websites or online top PCs, as it is said to be 12 times
flexible access to data, but provide shopping, therefore making an ef- more insecure than Windows XP,
cybercriminals a gateway to enter- fective cross-device protection cru- making it an open invitation to
prise networks as well. cial.
hackers, worms and viruses. ◊
In addition, the constantly growing Internet security companies, such By Daniela La Marca
connectedness of anyone with any as e.g. Symantec, McAfee, Trend
system anywhere provides new Micro or Kaspersky, provide solu-
targets for hackers. Thus, for in- tions in the retail segment that cen-
stance, industrial plants are in- ter user data and enable secure
creasingly becoming the focus of browsing - whether with a PC, Mac,
attacks, whereby individual ma- laptop, tablet or smartphone.
chines and robots are targeted that



MediaBUZZ Pte Ltd - Independant ePublisher for Asia
   1   2   3   4   5   6   7   8   9   10