{"id":21075,"date":"2016-03-10T14:27:27","date_gmt":"2016-03-10T14:27:27","guid":{"rendered":"http:\/\/www.businesscloudnews.com\/?p=246572"},"modified":"2016-03-10T14:27:27","modified_gmt":"2016-03-10T14:27:27","slug":"hybrid-environments-and-iot-pose-biggest-threats-to-infosec-f5","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/hybrid-environments-and-iot-pose-biggest-threats-to-infosec-f5\/","title":{"rendered":"Hybrid environments and IoT pose biggest threats to infosec \u2013 F5"},"content":{"rendered":"<p><a href=\"http:\/\/www.businesscloudnews.com\/files\/2016\/03\/F5-Forum-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-246582\" src=\"http:\/\/www.businesscloudnews.com\/files\/2016\/03\/F5-Forum-2-300x200.jpg\" alt=\"F5 Forum 2\" width=\"300\" height=\"200\" \/><\/a>Service providers and enterprises face an insecure networking environment in coming years as more applications, data and services are sent to the cloud, according to networking vendor F5, writes <a href=\"http:\/\/telecoms.com\/\">Telecoms.com<\/a>.<\/p>\n<p>Speaking at the F5 Forum in London, VP of UK and Ireland Keith Bird stressed security is now front and centre not only to the CTO and CEO, but to consumers as intrusion or security breaches regularly make headlines. Bird pointed to the hybrid on-premise\/cloud-based environment, in which an increasing number of enterprise and service providers operate, as a huge challenge looming for the information security industry.<\/p>\n<p>\u201cNot so long ago, we looked at just single points of entry. In today\u2019s hybrid world, we\u2019ve got apps in the data centre or in the cloud as SaaS and this is only increasing,\u201d he said. \u201cWhat we know for sure is that there is no longer a perimeter to the network \u2013 that\u2019s totally disappeared.\u201d<\/p>\n<p>\u201c81% of people we recently surveyed said they plan on operating in a hybrid environment, while 20% said they\u2019re now moving over half of their corporate applications to the cloud. Even some of the largest companies in the world are taking up to 90% of their applications to the cloud.\u201d<\/p>\n<p>Given the volume and nature of data being hosted in the cloud, firms are far more accountable and held to tighter information security standards today than they have ever been. The average financial impact of an information security breach is now in the region of $7.2 million, according to F5 research.<\/p>\n<p>\u201cThe average cost of a security breach consists of $110,000 lost revenue per hour of downtime \u2013 but the effect on a company\u2019s website or application is costing potential business,&#8221; said Bird. &#8220;The average customer will abandon an attempted session after roughly four seconds of inactivity, so there\u2019s new business being lost as well.\u201d<\/p>\n<p>F5 said of the threats it is seeing at the moment, according to customer surveys, the evolving nature and sophistication of attacks ranks highest, with the internal threat of employee ignorance a close second.<\/p>\n<p>\u201cSo what are the top security challenges our customers are seeing?\u201d said Bird. \u201c58% are seeing increasingly sophisticated attacks on their networks, from zero-day to zero-second. 52% were concerned that their own employees don\u2019t realise the impact of not following security policies. Obviously plenty of people said they don\u2019t have enough budget, but that\u2019s not quite the biggest problem facing security departments today.\u201d<\/p>\n<p>F5\u2019s Technical Director Gary Newe, who\u2019s responsible for field systems engineering, said the looming prospect of IoT \u201cscares the bejesus\u201d out of him.<\/p>\n<p>\u201cWe\u2019ve all heard about the IoT,\u201d he said before pointing to the connected fridge as a farcically insecure IoT device. \u201cThere are 3 billion devices which run Java, which makes it 3 million hackable devices, and that scares the bejesus out of me. This isn\u2019t just a potential impact to the enterprise, but it could have a massive impact on consumers and families. Fitness trackers, for example, just encourage people to give a tonne of data over to companies we don\u2019t know about, and we don\u2019t know how good their security is.\u201d<\/p>\n<p>The scariest bit, Newe emphasised, is the growing knowledge and intelligence of more technically adept youngsters today, and how the rate of technological change will only exacerbate the requirement for a fresh approach to network security.<\/p>\n<p>\u201cChange is coming at a pace, the likes of which we\u2019ve never seen nor ever anticipated,\u201d he said. \u201cWe\u2019re building big walls around our networks, but hackers are just walking through the legitimate front doors we\u2019re putting in instead.<\/p>\n<p>\u201cThe scariest thing is that the OECD [Organisation for Economic Cooperation and Development] has said the average IQ today is 10 points higher than it was 20 years ago. So teenagers today are smarter than we ever were, they\u2019ve got more compute power than we ever had, and they\u2019re bored. That, to me, is terrifying.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Service providers and enterprises face an insecure networking environment in coming years as more applications, data and services are sent to the cloud, according to networking vendor F5, writes Telecoms.com.<\/p>\n","protected":false},"author":105,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[183,1091,3009,1909,1976],"tags":[105,118],"class_list":["post-21075","post","type-post","status-publish","format-standard","hentry","category-hybrid-cloud","category-information-security","category-internet-of-things-telecoms","category-iot","category-news-analysis","tag-f5","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/21075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/105"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=21075"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/21075\/revisions"}],"predecessor-version":[{"id":21076,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/21075\/revisions\/21076"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=21075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=21075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=21075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}