Page 2 of 2
However, at least one channel partner said that the recent hacks against Sony's databases underscore the growing prevalence of targeted attacks, in which hackers set their sights on one organization and then find the weaknesses in its security posture to obtain financial or other confidential information.
"When it comes down to a targeted attack, there's always a way in. There's no 100 percent secure best practice," said Koji Mori, director of network services for Torrance, Calif.-based CalSoft Systems. "They're going to find a hole."
Mori said that, as with most targeted attacks, the weak link typically occurs with the end users that fall victim to some kind of social engineering scheme. As such, the security posture of an organization would likely have to include education component about social engineering.
"Security has really extended beyond the world of technology. The vulnerability is the actual employee or team member rather than the lock on the door," he said, adding that the accelerated adoption of cloud technology would naturally elicit an outpouring of concern regarding its security.
"But it's not an issue of cloud versus any security asset that you need to protect. Anything valuable is going to be a target. In a targeted attack, the only way to protect those assets is to make sure your whole organization is working toward a culture of understanding what risk is, and putting natural protections in place."