Higher instances of attacks on cloud and Internet-connected devices are likely in the coming year as cyber criminals evolve their approach towards accessing enterprise and consumer data, security software maker Symantec today said. “Given the significant shift towards cloud-based storage and services, the cloud is becoming a very lucrative target for attacks. The cloud is not protected by firewalls or more traditional security measures, so there will be a shift in where enterprises need to defend their data,” Symantec Director Solutions Product Management APJ Tarun Kaura said. Also Read - Beware! Chinese hackers targeting State Bank of India (SBI) users with phishing scams, moreAlso Read - Almost 60 percent of internet users in India fell prey to hacking in the last 1 year: Report
He added that attacks on cloud could result in multi-million dollar damages and loss of critical data. “Given the consistently changing security landscape, it’s important to take a moment and determine where the security industry needs to focus their attention as we move into the next year,” Kaura said unveiling Symantec’s security predictions for 2017.
Highlighting the proliferation of devices connected to the cloud and Internet, he said the shift toward “modern workplace” where businesses allow employees to introduce new technologies like wearables and virtual reality will continue. “Enterprises will need to shift their focus from safeguarding end-point devices toward protecting users and information across all applications and services. They will have to look beyond computers and mobile devices for vulnerabilities,” he said. ALSO READ: Public Cloud services in India will grow 35.9 percent to reach $1.3 billion in 2016: Gartner
Kaura added that nearly everything in an enterprise is now connected to the internet and will need to be protected. Another security challenge that may gain traction is ‘fileless malware’. Fileless infections are those written directly onto a computer’s RAM without using files of any kind. These are difficult to detect and often elude intrusion prevention and antivirus programs.