Product and service reviews are conducted independently by our editorial team, but we sometimes make money when you click on links. Learn more.

DDoS, BYOD Creating Security Challenges for IT

By - Source: Tom's Hardware US
Tags :

Network security and management solutions firm Arbor Networks has released a new edition of its Worldwide Infrastructure Security Report, which concluded that data centers and cloud services are becoming more attractive targets for cybercrime, and distributed denial of service (DDoS) attacks are evolving into more complex forms to create new headaches for IT staff.

According to the report, the largest reported DDoS attack was just 60 Gbps in 2012, flat with the results in 2011, and down from 100 Gbps in 2010. However, 27 percent reported an impact on their DNS infrastructure and 46 percent of the respondents reported multi-vector attacks. Arbor said that 86 percent of DDoS attacks targeted web services, which corresponds to a growing focus on data center attacks. 94 percent of data centers were attacked and 90 percent of attacks resulted in business impact due to incurred operational expenses. Arbor noted that e-commerce and online gaming sites are "increasingly targeted" and that companies and users have "to be wary of the shared risks and the potential for collateral damage."

The main security concern of service providers and enterprises is still anchored in botted or "otherwise compromised hosts" with 61 percent of respondents indicating that Intrusion Detection Systems (IDS) and Anti-Virus (AV) systems may not be able to reliably protect their networks given the sheer number and rapid evolution of malware variants. Arbor said that Advanced Persistent Threats (APTs) will pose greater concern in the future in the areas of "industrial espionage, data exfiltration and malicious insiders."

It is also somewhat apparent that BYOD represents a ticking bomb for many organizations. While 63 percent of respondents said they allow BYOD on their network, only 40 percent have the capability to monitor the devices they allow onto their network. "Clearly, BYOD is creating more entry points for hackers to enter the network," Arbor said.

Wolfgang GruenerWolfgang GruenerWolfgang Gruener is a contributor to Tom's IT Pro. He is currently principal analyst at Ndicio Research, a market analysis firm that focuses on cloud computing and disruptive technologies, and maintains the blog. An 18-year veteran in IT journalism and market research, he previously published TG Daily and was managing editor of Tom's Hardware news, which he grew from a link collection in the early 2000s into one of the most comprehensive and trusted technology news sources.

See here for all of Wolfgang's Tom's IT Pro articles.

Check Out These Recent IT Slideshows