Intelligent CIO Middle East Issue 04 | Page 55

INTELLIGENT BRANDS // Enterprise Security The next generation of cyber-security threats Given what we witnessed in 2015, while cloud, mobile and IoT will continue to dominate the discussion in many boardrooms, it is actually security that should be close to the top of the priority list for any CIO. To that end, it is worth understanding some of the factors that will shape the security threat landscape, writes Luke Brown, GM and VP, EMEA, India and LATAM at Digital Guardian. A n increase in wiper attacks Wiper attacks, which erase files from the victim’s computer drives in order to cripple essential apps, have been growing steadily for years. A wiper attack will not only damage the users IT systems, but can leave sensitive data exposed. Sony have been the most prolific organisation to suffer this kind of attack to date, however as these kinds of hacks become easier, businesses of all sizes must be prepared to protect against them. www.intelligentcio.com Investing in security is essential for any modern business, however it will only be effective if they invest in the right areas. Focusing on endpoint protection, disaster recovery and backup applications that can be easily scaled will significantly reduce the chance of wiper attacks causing lasting harm. for the companies involved and brought cyber-security to the forefront of every business-owner’s mind. Many of these attacks have been blamed on a rise in ‘hacktivism’. Self-proclaimed ‘hacktivists’ will attack companies for a variety of reasons, the most common of these being: Hacktivism will be the motive behind many more incidents High profile data breaches such as the TalkTalk, Ashley Madison and Experian hacks have been extremely damaging Ethics: To place the spotlight on and expose a company engaging in morally questionable practices Opposing values: As a result of INTELLIGENTCIO 55