A look at how the cyber security landscape has played out this past year, the online community has had to deal with a great deal of threats and attacks. If you’re looking for more tips, IT security has it for you. Perhaps those who have felt them more have been the organizations and businesses. Away from these, espionage has seen the targeting of government networks and other installations of national interest in countries in the Middle East as well and the American government. 2012 has also been an year in which the apple brand was rattled by the flashback Trojan which affected the Macs. The invincibility of the Macs in the face of malware and cyber threats was shattered and this changed the security landscape for good.
A review of the past year will point out to the numerous attacks which have been aimed on Google powered android platform. The open source nature of the platform has seen the exploitation of the feature by malware writers who worked to develop malware infected apps and these have been unleashed to the android app market. Unsuspecting android users have fallen for the cyber crime tactic. Mobile security and the debate surrounding android security will be a factor which cannot be ignored at all. The happenings this past year where the android malware attacks have increased by over 600% of what was reported the previous year. These figures give credibility to the fact that android security is needed and will be a big talking point in the coming year in a bid to stem the malware and attacks seen on the android platform.
It has been noted that cyber threats are now serious crimes and necessary steps and measures need to be done to confront this challenge. Cyber threats are no longer just an economic bottleneck but recent activity indicates that cyber threats are becoming a political, a security and a national issue. Hacktivism and espionage have been disturbing developments that now plague the cyber community. Predictions for the coming years outline that some of these threats will continue to increase in scale and further plague the cyber world.
In the current state of the world, the cyber space touches and impacts on about all facets of life. Cyber security is then the responsibility of all stakeholders in this field to work towards defending against the known threats and working towards preventing the further escalation of the cyber crime status. The unfortunate scenario has been that the attacks have taken a non discriminatory approach seen in the fact the cyber criminals and their rings do not spare anybody. Cyber attacks on individuals, on schools and learning institutions, government installations, military, businesses and any other establishment which can be added to this list have been reported. These attacks show the extent to which cyber crime affects many facets of life and how this monster is here to stay even in 2013. The sad scenario is that the cyber crime monster is nowhere near being tamed. There has been a steady rise in the number of threats identified each year. This means that the cyber security niche will remain on its toes to remain abreast of the happenings related to cyber crime. It culminates in the use of resources financial or otherwise. As a matter of fact, the budgets of businesses and other organizations continue growing in a bid to keep safe from cyber criminals.
The three major interventions which can be important in the quest to improve cyber security are; improving the ability to prevent the cyber threats which are both agile and sophisticated, improving on systems and the ability to recover from cyber crime incidences and improvement of infrastructure to ensure that it is resistant to penetration. These efforts cannot be done in isolation but require that cooperation is enhanced between parties who may be online users themselves, government which helps with the formulation and enactment of policies and laws, cyber security experts who research on cyber crime, trends and come up with measures including software and patches to keep away the cyber criminals and finally the cooperation from private sector and allied national governments.
And for the above named efforts to be successful, business, organizations, governments and individuals should have comprehensive information on their infrastructure and networks and the reported works and intentions of cyber criminals to be on the safe and secure side.