Study: Cyber ​​Security will become more complex in 2014



One organization expects global IT non-profit , to be next year, bad for businesses , large and small alike , in terms of information security , which will become more complicated , as she put it .

Society said , " ISI ICI " (ISACA) competent in the field of information security , it believes in the need to prepare professionals of information technology and information security from now to change rapidly , and the complexity will attest, the year 2014 , especially with regard to information security , and privacy of data, large data .

For his part, Pavash Bjat , CEO of " Ancresp " (EnCrisp), The pace of change is expected for 2014 will push the professional information technology in the workplace in a manner incredible, with a focus on the verification of the risks of this area , and at the same time they give the value of the business sector .

Among the areas that expects Association " ISV ICI " it should businesses prepare for it well over the next year , said : "Preparing for the privacy of 2.0" , as it is unlikely , according to the Assembly , it reaches attitudes towards data privacy to the consensus during 2014 . Instead , it will be the duty of businesses ready to reconcile the expectation of what little privacy and respect between those who put their personal data as currency and they want to have control over how to spend that currency .

It should be on businesses , according to the Association , to reduce the large data , where the data of non- management creates a kind of repetition that makes it difficult to secure . In 2014, the institutions ought to eliminate the increase and strengthen what remains , with the aim of promoting the participation and protect the use of the best controllers .

Society said , " ISI ICI " The need for security analysts' smarter and able to defend against the attacks of those who hold diplomas occasion is just what will grow through the year 2014 . So you need businesses that are planning to hire those competencies in the new year to make sure that the compensation package and work specifications provided to them highly competitive .

With some elements of the operational responsibility for IT security , including malware detection , and analysis of the events and process control , which is witnessing an increase in the use of confiscated external Mzdoa cloud computing services , the leaders are " smart " enable experts of Homeland Security to be fishermen instead of just defenders . According to the Association , it allows them to search for more proactive threats difficulty in discovery, and build the capacity of internal intelligence , in addition to derive standards and best investment in the analysis of operational risks .

Have on businesses , in light of research that predicted that the number of Internet-connected devices to 50 billion by the year 2020 , work from now on policy control these devices - many of which are invisible to the end user - and that if the institution does not have any of them now , the words " ISI ICI ."

It is noteworthy that the association " ISV ICI " is working to provide morphological range of guidance that will help businesses and the pioneers of information technology to maximize value and manage risk related to information and technology.

Post a Comment

Follow Us

Follow Us On YouTube

Hot Products in Week

Hot Products in Month

item