1
There were significant advances in cybersecurity in 2015, but as protections became more sophisticated, so did cybercriminals. Here are four areas AT&T experts say bear watching in 2016. Cybersecurity trends: Preparing for new threats As more devices become connected, the potential for attacks increases as well. Not all companies protect their networks against such attacks. Once a weapon exclusive to sophisticated cybercriminals, DDoS programs are now prepackaged and can be used by almost anyone. Patches, updates, and policy changes can be applied across a company in minutes. Multiple security controls can be combined to create a layered approach to cybersecurity. Data that you might feel is worthless can be valuable to cybercriminals. Even data you don’t need is a potential liability. Check your data storage and management systems for indications that they could be vulnerable to a cyberattack or are already being targeted. Internet of Things MILLION 25 PERCENT 458 Devices connected to the AT&T network PERCENT 62 SIMPLIFY SECURITY Increase in number of DDoS attacks since 2013 Increase in the number of IoT vulnerability scans seen by AT&T in the past two years Distributed Denial of Service Attacks Virtualized IT Environment © 2016 AT&T Intellectual Property. All rights reserved. AT&T and Globe logo are registered trademarks of AT&T Intellectual Property. BIG DATA Big Data For an in-depth discussion of these and other cybersecurity trends for 2016, watch our webinar.

cybersecurity-trends-preparing-for-new-threats

Embed Size (px)

Citation preview

There were significant advances in cybersecurity in 2015, but as

protections became more sophisticated, so did cybercriminals.

Here are four areas AT&T experts say bear watching in 2016.

Cybersecurity trends:Preparing for new threats

As more devices become connected, the potential for attacks increases as well.

Not all companies protect their networks against such attacks.

Once a weapon exclusive to sophisticated cybercriminals, DDoS programs are now prepackaged and can be used by almost anyone.

Patches, updates, and policy changes can be applied across a company in minutes.

Multiple security controls can be combined to create a layered approach to cybersecurity.

Data that you might feel is worthless can be valuable to cybercriminals. Even data you don’t need is a potential liability.

Check your data storage and management systems for indications that they could be vulnerable to a cyberattack or are already being targeted.

Internet of Things

MILLION25

PERCENT458

Devices connected to the AT&T network

PERCENT62

SIMPLIFY SECURITY

Increase in number of DDoS attackssince 2013

Increase in the number of IoT vulnerability scans seen by AT&T in the past two years

Distributed Denial of Service Attacks

Virtualized IT Environment

© 2016 AT&T Intellectual Property. All rights reserved. AT&T and Globe logo are registered trademarks of AT&T Intellectual Property.

BIG DATA

Big Data

For an in-depth discussion of these and other cybersecurity

trends for 2016, watch our webinar.