Skip the navigation

Cybercrime: The 2009 megathreat

By Larry Ponemon
December 16, 2008 12:00 PM ET

CSO - The 2009 Security Mega Trends Survey was conducted by Ponemon Institute and sponsored by Lumension Security Inc. to better understand if certain publicized IT risks to personal and confidential data are, or should be, more or less of a concern for companies. We asked 577 IT security practitioners to consider how 10 security megatrends affect companies today and to predict their impact during the next 12 to 24 months. The opinions of these experts, we believe, will be helpful to companies that are struggling to understand how they should allocate resources to the protection of data during these difficult economic times.

We selected the following megatrends for this study based on input from a panel of experts in IT security. They are cloud computing, virtualization, mobility and mobile devices, cybercrime, outsourcing to third parties, data breaches and the risk of identity theft, peer-to-peer file sharing, and Web 2.0.

The study examined the risks posed by megatrends that exist today and how the risk will change over the next 12 to 24 months. According to an overwhelming 77% of experts in IT security responding to our survey, cybercrime will become a "high" or "very high" risk over the next 12 to 24 months.

The selection of cybercrime as the megatrend most likely to be a high or very high risk in the next 12 to 24 months can be partly based on the fact that 92% of respondents to our study reported that their companies have experienced a cyberattack. The biggest security risk associated with cybercrime is that such an attack will cause a business interruption followed by the theft of customer and employee data.

Other megatrends becoming more risky are cloud computing, malware, Web 2.0 and mobile devices. In the case of cloud computing, it is the inability to assess or verify the security of data centers in the cloud and protect sensitive and confidential information. IT security practitioners see the risk of malware and Web 2.0 as resulting in the loss of sensitive or confidential business information including trade secrets.

It is interesting to note that in our study, IT security respondents perceive the risk of a mobile workforce as decreasing but mobile devices remaining a high or very high risk for many companies. According to respondents, the most risky mobile device is the laptop computer, and the No. 1 concern is the inability to properly identify and authenticate remote users.

Data Breaches and Outsourcing Risks Continue

Data breaches and outsourcing are forecast to remain at the same level of risk. IT security practitioners continue to worry about data breaches because, according to our study, only 16% are very confident or confident that current security practices are able to prevent customer and employee data from being lost or stolen. Therefore, it is understandable why the majority of respondents in IT security believe that data breaches will continue to pose a high and very high security threat to their organizations.

This story is reprinted from CSO Online.com, an online resource for information executives. Story Copyright CXO Media Inc., 2006. All rights reserved.
Our Commenting Policies