Feeds

Insecurity downtime on the up

Something else to worry about

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Firms with a blasé attitude to security could see system downtime caused as a result of software vulnerabilities treble by 2008. Gartner, the analyst firm, estimates downtime arising from software security issues could rise from five per cent of overall downtime in 2004 to 15 per cent by 2008.

"Increasing Internet activity, along with the use of web services, wireless connections and other new technologies, will lead to more vulnerable configurations," said John Pescatore, a research fellow at Gartner. "These vulnerabilities will cause increased downtime for organizations that don't push security concerns into their processes for software development and procurement."

Gartner defines vulnerability as a "weakness in process, administration or technology that can be exploited to compromise IT security". Basic operating system security is likely to improve over coming years, so Gartner thinks vulnerabilities associated with unsafe customer, employee and business partner "platforms" will become more pressing concerns.

Its report, Building a Sound Security Infrastructure: New Defenses for a New World of Threats, offers the following advice on reducing the scope of software problems to cause system downtime:

  • Pressure vendors to build more-secure software
  • Drive their development organisations to reduce security vulnerabilities in their own software
  • Base software architectures on security standards
  • Incorporate mechanisms to limit the "attack surface" of applications directly exposed to the internet

®

Related stories

Microsoft warns of poisoned picture peril
Beware of malformed MIME artists
Investors fret about IT security
Oracle joins the monthly patch bandwagon
Companies adapt to a zero day world

Choosing a cloud hosting partner with confidence

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.