Скачиваний:
40
Добавлен:
26.03.2016
Размер:
828.04 Кб
Скачать

5 Growing it Industry Trends & Developments

The face of IT is changing rapidly and there’s no going back. As a direct result of current economic necessities and ongoing technological developments, the IT industry is undergoing a number of fundamental shifts. In order to remain relevant to their clients and customers, it is increasingly important for businesses to monitor these developments closely, adapting essential products and services to meet new marketplace demands.

We’ve compiled the following list of 5 top industry trends changing the face of IT to help your business prepare for the fast-approaching future:

Mobile Devices --The basic tools that businesses and consumers use to interact with each other are currently undergoing a major behavioral shift. More than one-third of the conventional PC market is on the verge of being replaced by smartphones and tablet computers in the coming year and this trend shows no signs of slowing. By 2014, it is predicted that mobile Internet usage will overtake traditional desktop usage.

Cloud Computing --As businesses look for new ways to scale back on overhead and infrastructure costs, they are turning increasingly to Software-as-a-Service (SaaS) and other cloud-based computing solutions. Spurred in no small part by growing consumer confidence in this new technology, more and more businesses are discovering the advantages of moving their software applications to remote private cloud networks. As the economy recovers and growth resumes, these solutions allow for low-cost, on-demand scalability.

Virtualization --Just as cloud computing and SaaS have revolutionized the way companies access their software applications, recent trends in virtualization are allowing businesses to eliminate entire server farms and slash the associated operating costs. In addition to streamlining and making IT infrastructure more economical and flexible, server virtualization has laid the groundwork for more strategic IT initiatives going forward. As a result, Infrastructure-as-a-Service (in which companies rely on equipment owned by service providers) and Platform-as-a-Service (IaaS with a software development framework) are also growing in popularity.

Telework/Virtual Offices --With cloud computing capabilities and other advances in office connectivity growing by leaps and bounds, companies worldwide are realizing the cost-saving benefits of virtual office environments. By moving away from traditional physical office-based business models toward remote network structures, more and more businesses are taking advantage of this new technology to increase productivity and reduce overhead.

Alternative Productivity Applications -- Influenced by the recent economic downturn, companies are looking for new methods of improving productivity, increasing employee efficiency and optimizing their overall business processes. In this pursuit, new solutions in videoconferencing, unified communications and business intelligence applications will continue to grow and develop, since they help employees to work collaboratively in remote office environments. In addition to improvements in these already established areas, there is considerable demand and room for growth in the productivity software sector, with more and more businesses adopting new programs designed to improve efficiency, lower operating costs and streamline business processes.

For more information on how to put the latest IT trends and developments to work for your business, visit Abacus IT.

About Abacus IT

Abacus IT is an unparalleled provider of short-term and long-term IT solutions. With conveniently bundled monthly service plans to fit each client’s needs, regular diagnostic reviews, system monitoring, rapid response capabilities and proactive technology assessments, Abacus is the perfect IT partner for any business.

Security Think Tank: Monitoring and response capabilities key to mitigating cyber attack

http://www.computerweekly.com/opinion/Security-Think-Tank-Monitoring-and-response-capabilities-key-to-mitigating-cyber-attack

John Pironti

  • A

  • AA

  • AAA

  • Print

  • Email

  • Reprints

  • Facebook

  • inShare6

  • Share This

It is Isaca’s view that businesses of all shapes and sizes should regularly and consistently perform threat and vulnerability analyses of their critical business processes, core and sensitive data assets, and associated information infrastructure to help them evaluate and manage risks associated with them.  

Destructive attacks tend to be more obvious and serve to promote a position of the attacking party rather than attempt to gain access to or exploit data. 

This does not make them any less dangerous –and given recent events, their likelihood of occurrence should be considered fairly reasonable.  

To counteract these attacks, organisations should have consistent, mature and regularly exercised security monitoring capabilities and incident response plans that use the input from the threat and vulnerability analysis to identify attack behaviour as early as possible, and then effectively respond to them if they are successful.

Early warning and effective preparation can help to minimise the impact of attacks.  

From a business continuity perspective, organisations should also consider options of replicating key data assets and capabilities on systems that are not mirrors of each other and, in fact, operate on completely different operating systems, applications, networks, and storage solutions. 

This will reduce the ability for the attack to affect all of an organisation’s data and computing assets with the same attack methods and capabilities. 

John Pironti is a risk advisor at Isaca and president of IP Architects

Security Think Tank: Mitigation strategies for data-wiping malware

http://www.computerweekly.com/opinion/Security-Think-Tank-Mitigation-strategies-for-data-wiping-malware

Peter Wenham

  • A

  • AA

  • AAA

  • Print

  • Email

  • Reprints

  • Facebook

  • inShare3

  • Share This

While data-wiping malicious software – malware – is not new, the FBI was moved in December 2014 to issue a flash alert to US businesses, writes Peter Wenham. This alert highlighted the new malware that not only deletes files on an infected PC, but also overwrites the MBR sector of the PC’s hard drive, making it impossible for the PC to boot. Recovery is time-consuming and costly, either requiring the disinfection of the MBR followed by a re-imaging of the drive; or installing a new hard drive and re-imagining. For the smaller company the likely case would be re-building a PC’s hard drive from scratch. Note that, in all cases, any data on a PC’s hard drive at the time of infection would be lost.

Mitigation strategies are twofold – prevention, and recovery should the worst happen. The recovery strategy is the easier, requiring that all PCs are regularly backed up (monthly, with weekly deltas being recommended, and daily deltas if you have the resources); and that all company data is backed up (weekly, with daily deltas) – preferably with a copy held on an off-line resource, (old-fashioned tape drives come to mind, or DVDs/Blurays for the smaller business).

The key is being able to recover company data that is no older than one or two days from a clean resource. 

The prevention strategy is a bit more complex. Training staff is an obvious first step – and do not forget management and directors – plus regularly reminding people not to open files from unknown sources or files received unexpectedly. A more difficult concept is to get people to the point where they look and think about a website address: Does it look right? Why I might I want to go to that site? And so on.

A second part of the strategy is not giving people local administrator access to their PC. Make sure staff access profiles on the company network are set for minimum privilege – the cleaner does not need Power User – and that the files that can be accessed are appropriate for a persons function. Nobody – and that includes senior managers and directors – should be given access to all company files except backup mechanisms and system administrators. System administrators should have two network IDs, a standard user account for day-to-day use and a system administrator account for system maintenance.

Finally, there is the technical aspects of the prevention strategy. Operating systems and application software should be up-to-date and maintained, as should antivirus software and backup mechanisms for servers and PCs. Maintained infrastructure includes firewalls and antispam and antivirus mechanisms on the companies email – there are a number of companies offering these services, either for in-house use or via the internet. Logging should be in place and preferably to a dedicated servers that requires a unique “auditor” account to access.

Peter Wenham is a committee member of the BCS Security Forum strategic panel and director of information assurance consultancy Trusted Management.