Comunicacion Con Sokets
HigHligHting global security tHreats and trends
The Cisco® Annual Security Report provides an overview of the combined security intelligence of the entire Cisco organization. The report encompasses threat information and trends collected between January and November 2011. It also provides a snapshot of the state of security for that period, with specialattention paid to key security trends expected for 2012.
PART 1
3 5 8 Welcome to the Connected World Your Future Workers: Loaded with Devices, and Not Overly Concerned About Security Social Media: Now, It’s a Productivity Tool 10 Remote Access and BYOD: Enterprises Working to Find Common Ground with Employees 16 The Influence of Mobile Devices, Cloud Services, and Social Media on Security Policyin the Enterprise
PART 2
22 23 24 26 28 29 31 32 35 Cyber Threat Outlook for 2012: The Hacktivism Factor Geopolitical Trends: Social Media Wields “Gathering” Power Announcing the 2011 Winners of the Cisco Cybercrime Showcase The Cisco Cybercrime Return on Investment (CROI) Matrix 2011 Vulnerability and Threat Analysis Global Spam Update: Dramatic Decline in Spam Volume The Cisco Global ARMSRace Index The Internet: A Fundamental Human Necessity? Cisco Security Intelligence Operations
All contents are Copyright © 2011–2012 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Cisco 2011 Annual Security Report
1
1
PART
2
Cisco 2011 Annual Security Report
All contents are Copyright © 2011–2012 Cisco Systems, Inc. All rights reserved.This document is Cisco Public Information.
Welcome to the Connected World
Imagine the 1960s office of the fictional advertising agency portrayed on the American television show “Mad Men”: When it came to technology, workers could avail themselves of typewriters and telephones (both operated largely by the secretarial pool)—which were basically all they had in the way of productivityenhancingequipment. Employees attended perhaps one or two meetings a day; work began when people arrived at the office, and stopped when they went home. Today’s workers get more done over breakfast or during the morning commute than their 1960s predecessors accomplished in an entire day. Thanks to the array of technology innovations flooding into the workplace— everything from tablets to social networkingto videoconferencing systems such as telepresence—employees can work almost anywhere and anytime they need to, provided the right technology is there to support connectivity and, even more importantly, provide security. In fact, the modern workplace may differ from its 1960s counterpart most dramatically in terms of the lack of actual people: Showing up at the office is less and less necessary.Along with the onslaught of technology innovations, there’s also been a shift in attitude. Today’s workers have become so accustomed to the productivity benefits and ease of use of their devices, social networks, and web applications that they see no reason why they can’t use all these tools for work as well as for play. The boundaries between work and home are nearly nonexistent: These workerschat with their supervisors on Facebook, check work email on Apple iPads after watching a movie with the kids, and turn their own smartphones into mini-workstations. Unsurprisingly, many enterprises are questioning the impact of technology innovation and flexible work habits on corporate information security—and sometimes, take the drastic step of banning devices or restricting access to web servicesthat workers say they need (and do need, in most cases). But organizations that don’t allow workers this flexibility—for instance, allowing them to use only a given company-owned smartphone—will soon find they can’t attract talent or remain innovative. Research conducted for the Cisco Connected World Technology Report study (www.cisco.com/en/US/netsol/ ns1120/index.html) documents changing...
Regístrate para leer el documento completo.