{"id":10690,"date":"2011-12-15T08:15:00","date_gmt":"2011-12-15T13:15:00","guid":{"rendered":"http:\/\/devweb.rjrinnovations.com\/2012-security-predictions-2\/"},"modified":"2018-07-23T11:37:40","modified_gmt":"2018-07-23T15:37:40","slug":"2012-security-predictions-2","status":"publish","type":"post","link":"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/","title":{"rendered":"2012 Security Predictions"},"content":{"rendered":"<div>\n<p> According to Help Net Security, these are the influential security trends to watch in 2012. What do you think?<\/p>\n<p><strong>1. The human perimeter<\/strong><\/p>\n<p><em>Expectation:<\/em>\u00a0further examples of the socially engineered  email attacks combined with zero day exploits as perpetrated against RSA  and its client base, Operation Aurora and Google Gmail.<\/p>\n<p><em>Prevention:<\/em>\u00a0Frequent staff training and refresher courses  are vital. Security processes may be perceived to be hampering working  practices so ensure procedures are tailored to the business to prevent  users circumventing them. Use a sender email framework to identify  suspect email.<\/p>\n<p><strong>2. Media mining<\/strong><\/p>\n<p><em>Expectation:<\/em>\u00a0social media and active media sites will  increasingly be mined for information in order to crack passwords,  perform identity theft or to socially engineer access to a network or  building. Other avenues such as RFID and radio frequency channels could  also provide valuable personal information by hacking voicemail or  intercepting calls.<\/p>\n<p><em>Prevention:<\/em>\u00a0The work\/leisure divide no longer exists so be  prepared to educate users on how to protect their anonymity and  lock-down information on social media sites. Provide clear guidelines on  acceptable use.<\/p>\n<p><strong>3. \u2018Bring your own\u2019 device issues<\/strong><\/p>\n<p><em>Expectation:<\/em>\u00a0opportunist theft will rise as hackers record log-in details or observe transactions and then replicate these.<\/p>\n<p><em>Prevention:<\/em>\u00a0Revise network access restrictions via remote  and wireless connections. Strengthen access control through regular  password renewal, two-factor authentication over VPN, review role-based  access privileges and carry out regular auditing and penetration  testing.<\/p>\n<p><strong>4. USB jacking<\/strong><\/p>\n<p><em>Expectation:<\/em>\u00a0The emergence of new malware payloads will see the USB become a greater threat to the PC and corporate networks.<\/p>\n<p><em>Prevention:<\/em>\u00a0Ensure the security policy provides clear  guidelines on USB and external device control: users often mistakenly  believe that only previously used devices are vulnerable. Traditional  USB malware can be detected by scanning removable devices and disabling  the autorun feature. New breeds of malware will require more  sophisticated monitoring techniques.<\/p>\n<p><strong>5. Cloud concerns<\/strong><\/p>\n<p><em>Expectation:<\/em>\u00a0Cloud computing adoption among medium to large  enterprises will slow due to legislative changes. APTs will seek to  exploit cloud-based data. There will be a rationalization of the cloud  while businesses consider how to use it to greatest effect without  compromising data integrity.<\/p>\n<p><em>Prevention:<\/em>\u00a0Ensure only non-sensitive data is held in the  cloud and provide guidelines on the use of cloud-based file sharing.  Protect wireless and wired networks through the use of a DMZ, with  sensitive information held offline or on a separate dedicated network.<\/p>\n<p>By: Cheryl Barto Shoults <\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>According to Help Net Security, these are the influential security trends to watch in 2012. What do you think? 1. The human perimeter Expectation:\u00a0further examples of the socially engineered email attacks combined with zero day exploits as perpetrated against RSA and its client base, Operation Aurora and Google Gmail. Prevention:\u00a0Frequent  [&#8230;]<\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[39],"class_list":["post-10690","post","type-post","status-publish","format-standard","hentry","category-blog","tag-english-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>2012 Security Predictions - RJR Innovations<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2012 Security Predictions - RJR Innovations\" \/>\n<meta property=\"og:description\" content=\"According to Help Net Security, these are the influential security trends to watch in 2012. What do you think? 1. The human perimeter Expectation:\u00a0further examples of the socially engineered email attacks combined with zero day exploits as perpetrated against RSA and its client base, Operation Aurora and Google Gmail. Prevention:\u00a0Frequent [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/\" \/>\n<meta property=\"og:site_name\" content=\"RJR Innovations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/\" \/>\n<meta property=\"article:published_time\" content=\"2011-12-15T13:15:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-23T15:37:40+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RJRInnovations\" \/>\n<meta name=\"twitter:site\" content=\"@RJRInnovations\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/2012-security-predictions-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/2012-security-predictions-2\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"2012 Security Predictions\",\"datePublished\":\"2011-12-15T13:15:00+00:00\",\"dateModified\":\"2018-07-23T15:37:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/2012-security-predictions-2\\\/\"},\"wordCount\":398,\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"keywords\":[\"English @fr\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/2012-security-predictions-2\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/2012-security-predictions-2\\\/\",\"name\":\"2012 Security Predictions - RJR Innovations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\"},\"datePublished\":\"2011-12-15T13:15:00+00:00\",\"dateModified\":\"2018-07-23T15:37:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/2012-security-predictions-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/2012-security-predictions-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/2012-security-predictions-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.rjrinnovations.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2012 Security Predictions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#website\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"name\":\"RJR Innovations\",\"description\":\"Connect your business... All of IT\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.rjrinnovations.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#organization\",\"name\":\"RJR Innovations\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"contentUrl\":\"https:\\\/\\\/www.rjrinnovations.com\\\/wp-content\\\/uploads\\\/2015\\\/07\\\/RJR_Logo_Blue_Text_400x263.png\",\"width\":400,\"height\":237,\"caption\":\"RJR Innovations\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rjrinnovations.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/RJR-Innovations-107107129324171\\\/\",\"https:\\\/\\\/x.com\\\/RJRInnovations\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/rjr-innovations\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/RJRInnovations\"]},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2012 Security Predictions - RJR Innovations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/","og_locale":"fr_FR","og_type":"article","og_title":"2012 Security Predictions - RJR Innovations","og_description":"According to Help Net Security, these are the influential security trends to watch in 2012. What do you think? 1. The human perimeter Expectation:\u00a0further examples of the socially engineered email attacks combined with zero day exploits as perpetrated against RSA and its client base, Operation Aurora and Google Gmail. Prevention:\u00a0Frequent [...]","og_url":"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/","og_site_name":"RJR Innovations","article_publisher":"https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","article_published_time":"2011-12-15T13:15:00+00:00","article_modified_time":"2018-07-23T15:37:40+00:00","twitter_card":"summary_large_image","twitter_creator":"@RJRInnovations","twitter_site":"@RJRInnovations","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/#article","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/"},"author":{"name":"","@id":""},"headline":"2012 Security Predictions","datePublished":"2011-12-15T13:15:00+00:00","dateModified":"2018-07-23T15:37:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/"},"wordCount":398,"publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"keywords":["English @fr"],"articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/","url":"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/","name":"2012 Security Predictions - RJR Innovations","isPartOf":{"@id":"https:\/\/www.rjrinnovations.com\/#website"},"datePublished":"2011-12-15T13:15:00+00:00","dateModified":"2018-07-23T15:37:40+00:00","breadcrumb":{"@id":"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.rjrinnovations.com\/fr\/2012-security-predictions-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rjrinnovations.com\/fr\/"},{"@type":"ListItem","position":2,"name":"2012 Security Predictions"}]},{"@type":"WebSite","@id":"https:\/\/www.rjrinnovations.com\/#website","url":"https:\/\/www.rjrinnovations.com\/","name":"RJR Innovations","description":"Connect your business... All of IT","publisher":{"@id":"https:\/\/www.rjrinnovations.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rjrinnovations.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.rjrinnovations.com\/#organization","name":"RJR Innovations","url":"https:\/\/www.rjrinnovations.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","contentUrl":"https:\/\/www.rjrinnovations.com\/wp-content\/uploads\/2015\/07\/RJR_Logo_Blue_Text_400x263.png","width":400,"height":237,"caption":"RJR Innovations"},"image":{"@id":"https:\/\/www.rjrinnovations.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RJR-Innovations-107107129324171\/","https:\/\/x.com\/RJRInnovations","https:\/\/www.linkedin.com\/company\/rjr-innovations","https:\/\/www.youtube.com\/user\/RJRInnovations"]},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10690","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/comments?post=10690"}],"version-history":[{"count":0,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/posts\/10690\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/media?parent=10690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/categories?post=10690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rjrinnovations.com\/fr\/wp-json\/wp\/v2\/tags?post=10690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}