The evolving threat landscape
How can you protect against an ever evolving attacker?
Keeping your office computing systems secure is a constantly moving target. In this video, HP's Head of Security Lab Simon Shiu and some real-world business IT users explain what kind of threats they are looking out for now and in the future. In particular, cybercrime is now an economy that can generate huge amounts of money, making the incentives for criminals to keep developing their tactics very considerable. Protection starts with ensuring systems are fully patched, but also includes keeping an eye on new legal provisions, in particular the EU's General Data Protection Regulation (GDPR), which aims to give control of personal data back to citizens and increases the fines for not doing so.
In the same way that new business ideas can become hits almost overnight for example the rapid onslaught of new social media and chat applications innovative threats can enjoy similarly speedy success. A very sophisticated piece of malware that proves successful can spawn lots of derivatives that multiply the danger very quickly. Although the original code might have taken considerable expense and expertise to develop, once this has a proven track record, it will easily be copied and customised. This is why HP focuses strongly on researching new threats, so that these can be combated with new security strategies as soon as they are encountered on corporate networks.
Find out how HP can protect your business against the evolving threat landscape.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Forget MFA fatigue, attackers are exploiting ‘click tolerance’ to trick users into infecting themselves with malware
News Threat actors are exploiting users’ familiarity with verification tests to trick them into loading malware onto their systems, new research has warned.
By Solomon Klappholz
-
Amazon confirms employee data compromised amid 2023 MOVEit breach claims – but the hacker behind the leak says a host of other big tech names are also implicated
News Millions of records stolen during the 2023 MOVEit data breach have been leaked
By Solomon Klappholz
-
Nearly 70 software vendors sign up to CISA’s cyber resilience program
News Major software manufacturers pledge to a voluntary framework aimed at boosting cyber resilience of customers across the US
By Solomon Klappholz
-
PyPI attack: Targeting of repository 'shows no sign of stopping'
News Greater collaboration and understanding of attackers’ tactics is key to mitigating open source security threats
By Ross Kelly
-
Capita's handling of cyber attack shows companies still fail at breach reporting
Analysis Capita initially told customers there was “no evidence” of data having been compromised in the March cyber attack
By Ross Kelly
-
Malware being pushed to businesses by search engines remains a pervasive threat
News High-profile malvertising campaigns in recent months have surged
By Ross Kelly
-
There's only one way to avoid credential stuffing attacks
Opinion PayPal accounts were breached last year due to a credential stuffing attack, but can PayPal avoid taking responsibility?
By Davey Winder
-
Five things to consider before choosing an MFA solution
In-depth Because we all should move on from using “password” as a password
By Rene Millman