Unisys Report: Security Methods Will Change In 2010

1. Data Protection Is The Order Of The Day

Unisys experts said that organizations will shift from infrastructure security to data protection. That is a direct result of employees and consumers increasingly using smartphones and PDAs to conduct business transactions online. Organizations will look for newer, more effective methods of protecting data beyond simple PINs and passwords. As malware and spyware continue to threaten consumer devices, users will demand that security platforms and antifraud applications will, in fact, protect their data.

2. Going Beyond A Crystal Ball

Companies will also try to determine what prompts security attacks. Unisys noted that organizations are likely to adopt a holistic approach to their IT environments and will seek to better understand the human element behind illegal activities to help them figure out when a breach is likely to occur. In addition, ports will use a similar predictive approach to pinpointing when security breaches are eminent. For example, more and more ports will rapidly scan cargo shipments as they cross land borders into the United States.

id
unit-1659132512259
type
Sponsored post

3. Biometrics Will Play A Larger Role

Biometric identification tools such as iris, facial or fingerprint scans will become regular features at border and custom checkpoints in airports, and will be used to verify identity. Unisys experts point out that many governments have invested in an electronic passport infrastructure, but have not yet used it.

4. You Can't Protect Everything

Organizations traditionally have attempted to protect "everything." Starting in 2010, Unisys suggests that companies will instead prioritize security controls based on whether the data in question presents low, moderate or high levels of risk. As a result, a number of companies will migrate less sensitive public data into cloud computing environments to attain cost savings in 2010. More sensitive data will follow as new security models are developed to address multi-tier data protection.