New Year, New Threats?

Don't get caught out in 2007 - be prepared for the security threats. 2006 - the year that Italy won the World Cup and Take That reformed after 10 years. And millions of businesses suffered downtime or damage thanks to phishing, viruses, and other malicious threats.

According to GFI, a leading provider of network security, content security and messaging software, every IT manager should make it part of their New Year's Resolution to protect their networks from the following threats in 2007:

- Piracy: To protect themselves from legal action companies need to monitor networks more effectively, to ensure employees do not copy illegal material.

- Targeted data theft: Even more then before crime cartels are realising that information can be as valuable, if not even more so, than drugs and weapons so companies need to take adequate steps to protect data.

- Phishing: This is an easy way for criminals to harvest credit card and other personal information and companies need to protect themselves from such threats.

- USB: The proliferation of USB devices and improvements in storage technology lead to the inevitability that targeted attacks using techniques such as hacksaw or pod slurping will increase.

- Malware: Although Microsoft Vista is more secure, third-party software can be targeted as a means of infecting a system through the back door. Security vendors need to catch up, and quickly.

- Vista IPv6 Windows Internet Computer Name: This technology will allow every Vista installation to have its own internet domain name, exposing users to the threat of "man-in-the-middle" attacks and spoofing. While users will have the option of two running modes, the secure mode is just too complex for most users, making it unlikely that many people will choose that option.

- Wireless: Is the next evolutionary step of pod slurping and hacksaw-like attacks that they will involve wireless devices? Watch out for this in 2007.

- Games Consoles: Playstation 3 and Xbox 360 both have extensive processing power as well internet connections and it is only a matter of time before malicious attacks start targeting these systems with DDOS attacks as well as traditional spam.