{"id":746,"date":"2013-12-20T10:57:55","date_gmt":"2013-12-20T18:57:55","guid":{"rendered":"http:\/\/www.nocontest.ca\/?p=746"},"modified":"2013-12-20T10:57:55","modified_gmt":"2013-12-20T18:57:55","slug":"undermining-infrastructure-at-the-core","status":"publish","type":"post","link":"https:\/\/www.nocontest.ca\/index.php\/2013\/12\/20\/undermining-infrastructure-at-the-core\/","title":{"rendered":"&#8220;Undermining Infrastructure at the Core&#8221;"},"content":{"rendered":"<p>Our friends at <a title=\"Sophos\" href=\"http:\/\/www.sophos.com\/en-us\/\">Sophos<\/a> have issued their <a title=\"Sophos 2014 Report\" href=\"http:\/\/www.sophos.com\/en-us\/threat-center\/security-threat-report.aspx\">Security Threat Report 2014<\/a>. \u00a0The entire report is necessary, sometimes grim reading. Here are two &#8220;trends to watch&#8221;:<\/p>\n<blockquote><p><strong>Attacks on corporate and personal data in the cloud:\u00a0<\/strong>As businesses increasingly rely on various\u00a0<a href=\"https:\/\/secure2.sophos.com\/en-us\/security-news-trends\/whitepapers\/gated-wp\/fixing-your-dropbox-problem.aspx\">cloud services<\/a>\u00a0for managing their customer data, internal project plans and financial assets, we expect to see an emergence of attacks targeting endpoints, mobile devices and credentials as means to gaining access to corporate or personal clouds.<\/p>\n<p>It\u2019s hard to predict what form future attacks will take\u2014but we can imagine ransomware taking hostage not just your local documents, but any type of cloud-hosted data. These attacks may not require data encryption and could take the form of blackmail\u2014threats of going public with your confidential data. Strong password and cloud data access policies are more important than ever. Your security is only as good as your weakest point, in many cases your Windows endpoint and your users\u2019 awareness.<\/p>\n<p><strong>Undermining hardware, infrastructure and software at the core:\u00a0<\/strong>The revelations throughout 2013 of\u00a0<a href=\"http:\/\/www.sophos.com\/en-us\/security-news-trends\/whitepapers\/gated-wp\/whos-snooping-on-your-email.aspx\">government agency spying<\/a>\u00a0and backdoors (not only by governments, but also commercial organizations) showed the world that broad-scale compromise of the core infrastructure we all operate on is not only possible, but happening. We\u2019ll need to re-evaluate technologies and trusted parties. The discoveries so far likely only scratch the surface and we can expect to see many more of these stories in 2014. Most enterprises won\u2019t have the resources or skills to go digging for backdoors. But it would be wise to closely monitor the work of security researchers and media outlets for new revelations.<\/p><\/blockquote>\n<p>On this latter trend, the wonderful <a title=\"Tom Tomorrow\" href=\"http:\/\/thismodernworld.com\">editorial cartoonist Tom Tomorrow<\/a> was prophetic. The cartoon below is from 1994:<\/p>\n<p style=\"text-align: center\"><a title=\"TomTomorrow1994cartoon\" href=\"http:\/\/thismodernworld.com\/archives\/8019\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-749\" style=\"border: 3px solid black\" alt=\"tom1994_1\" src=\"https:\/\/i0.wp.com\/www.nocontest.ca\/wp-content\/uploads\/2013\/12\/tom1994_1-300x117.jpg?resize=300%2C117\" width=\"300\" height=\"117\" srcset=\"https:\/\/i0.wp.com\/www.nocontest.ca\/wp-content\/uploads\/2013\/12\/tom1994_1.jpg?resize=300%2C117&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.nocontest.ca\/wp-content\/uploads\/2013\/12\/tom1994_1.jpg?resize=768%2C301&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.nocontest.ca\/wp-content\/uploads\/2013\/12\/tom1994_1.jpg?w=1024&amp;ssl=1 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our friends at Sophos have issued their Security Threat Report 2014. \u00a0The entire report is necessary, sometimes grim reading. Here are two &#8220;trends to watch&#8221;: Attacks on corporate and personal data in the cloud:\u00a0As businesses increasingly rely on various\u00a0cloud services\u00a0for &hellip; <a href=\"https:\/\/www.nocontest.ca\/index.php\/2013\/12\/20\/undermining-infrastructure-at-the-core\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5],"tags":[92],"class_list":["post-746","post","type-post","status-publish","format-standard","hentry","category-roberts-posts","tag-security-2"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.nocontest.ca\/index.php\/wp-json\/wp\/v2\/posts\/746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nocontest.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nocontest.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nocontest.ca\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nocontest.ca\/index.php\/wp-json\/wp\/v2\/comments?post=746"}],"version-history":[{"count":0,"href":"https:\/\/www.nocontest.ca\/index.php\/wp-json\/wp\/v2\/posts\/746\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.nocontest.ca\/index.php\/wp-json\/wp\/v2\/media?parent=746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nocontest.ca\/index.php\/wp-json\/wp\/v2\/categories?post=746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nocontest.ca\/index.php\/wp-json\/wp\/v2\/tags?post=746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}