2013-01-18

Businesses, beware of spam

India remains the top country for distributing spam, dominating the top of the list and setting an all-time record by sending out roughly 16 per cent of all spam registered today, states IBM\\\\\\\'s \\\"X-Force 2012 Mid-Year Trend and Risk Report.\\\"

Businesses, beware of spam

Over the recent one year, there has been a 25 per cent growth in the Indian Internet users which resultantly has attributed to the increase in spam. Prior to India, the United States was the record holder with around 15 per cent in its kitty in 2007. It is for the first time that any country has accounted for 16 per cent of all spams. The findings of the report also state that there is a significant increase in browser-related exploits, renewed concerns around social media password security and continued challenges in mobile devices.

The data for the bi-annual X-Force report comes from IBM's security operations centers which monitor more than 15 billion security events a day on behalf of approximately 4,000 clients in more than 130 countries.

 

Increasing security concerns

In an ideal world, everyone would use a random password for every website they log into. There are a wide variety of tools to make this a reality for those willing to do so. As companies and individuals strive to keep afoot with the ever expanding businesses and try to get global, security investments should be one of their core concerns. Keeping the increasing security risks in mind, businesses have to be proactive about security.

The report mentions the emerging trends in mobile security and states that while there are instances of exotic mobile malware, most smartphone users are still most at risk of premium SMS (short message service, or texting) scams. These scams work by sending SMS messages to premium phone numbers in a variety of different countries automatically from installed applications. There are multiple scam infection approaches for this. First, an application that looks legitimate in an app store but only has malicious intent.  Second, an application that is a clone of a real application with a different name and has some malicious code. Third, a real application that has been wrapped by malicious code and typically presented in an alternative app store.

While the connection between websites, cloud-based services, and Webmail provides for a seamless experience from device to device, users should be cautious about how these accounts are connected, the security of their password, and what private data has been provided for password recovery or account resetting. The report recommends the use of a lengthy password comprised multiple words instead of an awkward combination of characters, numbers and symbols.

On the server side, the report recommends encrypting passwords to the database using a hash function that is suitable for password storage. The hash function should be difficult to calculate, which helps limit the effectiveness of attacks.

 

Rules and regulations vs the real world

No matter how strict corporate security policies are regarding passwords, users most often do the bare minimum needed to be compliant. It is human nature: if we do not understand the reason behind something, we are less likely to follow through. The report suggests that companies should take the time to educate users on how easy it is to have their personal finances spoiled by some attacker and they may develop a much greater sense of caring about their passwords.

On the positive side, the report stated that there continues to be progress in certain areas of Internet security. IBM X-Force data reports a continuing decline in exploit releases, improvements from the top ten vendors on patching vulnerabilities and a significant decrease in the area of portable document format (PDF) vulnerabilities. IBM believes that this area of improvement is directly related to the new technology of sandboxing provided by the Adobe Reader X release.

Related opportunities
  • Others Health Care & Fitness
    Outbloom Clinic is one of the leading providers of advanced..
    Locations looking for expansion rajasthan
    Establishment year 2010
    Franchising Launch Date 2023
    Investment size Rs. 1 Cr. - 2 Cr
    Space required 1500
    Franchise Outlets -NA-
    Franchise Type Unit
    Headquater jaipur rajasthan
  • Precious Jewellery
    RANISHAA is founded by TIKA RAM & SONS JEWELLERS with the goal of..
    Locations looking for expansion Uttar pradesh
    Establishment year 2019
    Franchising Launch Date 2022
    Investment size Rs. 30lakh - 50lakh
    Space required 300
    Franchise Outlets -NA-
    Franchise Type Unit
    Headquater Badaun Uttar pradesh
  • Car Wash / Ceramic Coating / Detailing
    CARZSPA, being the OLDEST, MOST EXPERIENCED, MOST TRUSTED and THE..
    Locations looking for expansion Gujarat
    Establishment year 2006
    Franchising Launch Date 2007
    Investment size Rs. 20lakh - 30lakh
    Space required 2000
    Franchise Outlets -NA-
    Franchise Type Unit
    Headquater Surat Gujarat
  • Others Clothing
    Toonyport stands at the forefront of children's fashion, specializing in..
    Locations looking for expansion West bengal
    Establishment year 2022
    Franchising Launch Date 2024
    Investment size Rs. 20lakh - 30lakh
    Space required 500
    Franchise Outlets -NA-
    Franchise Type Unit
    Headquater Kolkata West bengal
Insta-Subscribe to
The Franchising World
Magazine
tfw-80x109
For hassle free instant subscription, just give your number and email id and our customer care agent will get in touch with you
email
mobile
OR Click here to Subscribe Online
Daily Updates
Submit your email address to receive the latest updates on news & host of opportunities

Free Advice - Ask Our Experts

pincode
;
ads ads ads ads