The demand for secure networks

With all the changes taking place on the internet, the demand for a secure network is increasing. The volume of online traffic is increasing exponentially as each connection is moving more data including voice video and multimedia. This means there is a growing pressure on CIOs to manage their organisation’s IT infrastructure efficiently and avoid surrendering control of their networks.

  • E-Mail
By  Angela Prasad Published  February 5, 2006

|~||~||~|With all the changes taking place on the internet, the demand for a secure network is increasing. The volume of online traffic is increasing exponentially as each connection is moving more data including voice video and multimedia. This means there is a growing pressure on CIOs to manage their organisation’s IT infrastructure efficiently and avoid surrendering control of their networks. Internet security breaches are not new, and it is almost impossible to have a 100% secure online environment. However, enterprises need to take a more holistic defence system for their IT platforms. Security must reside in every subsystem of the infrastructure. It must go beyond the four walls of the company. IBM anticipates a fundamental shift in cyber crime from pervasive global outbreaks to smaller, stealthier attacks targeted at specific organisations for extortion purposes. According to the vendor’s 2005 Global Business Security Index Report, the global IT threat landscape spent the majority of 2005 at the medium level. While the Zotob worm gained international attention, impacting media organisations, there were decidedly fewer global malware outbreaks than the previous year. However, that does not tell the whole story. IBM says the criminal element motivating many spam, malware and other IT attacks became apparent last year. High profile arrests of cyber criminals in the United States and also around the world pointed to individuals linked to organised crime and motivated to make money. With software and networks becoming increasingly more secure, it is anticipated that many of these criminals may target the most vulnerable access point within a company or its personnel to execute an attack. "The decrease in pervasive attacks in 2005 is counter-intuitive to what society at large believes is a major threat to their personal data," says Cal Slemp, vice president of IBM’s security and privacy services. "IBM believes that the environment has shifted - with increased security protection on most systems and stiffer penalties, we are seeing organised, committed, and tenacious profiteers enter this space. This means that attacks will be more targeted and potentially damaging. Organisations around the world - from the public and private sectors - must move quickly and work together to address this growing challenge,” he adds. The time has come for IT administrators to find ways of beating cyber attackers at their own game. ||**||

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code