• Latest
  • All
  • How To
Cisco 2013 Annual Security Report Expanding Connectivity Has Significant Impact on Online Threats

Cisco 2013 Annual Security Report Expanding Connectivity Has Significant Impact on Online Threats

May 18, 2013
Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
DHgate Tablet Cases deals
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025
Airtel Africa Starlink partnership

Starlink Is Expanding in Africa Through New Airtel Partnership

May 8, 2025
Android FreeType patch

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

May 7, 2025
worldcoin kenya

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

May 7, 2025
smartphones-2024

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

May 7, 2025
GTA 6 Trailer 2

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

May 7, 2025
YouTube Premium Duo

YouTube Now Lets Two People Share a Premium Plan

May 6, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Cisco 2013 Annual Security Report Expanding Connectivity Has Significant Impact on Online Threats

Carlos Ageng'o by Carlos Ageng'o
May 18, 2013
in News
Reading Time: 2 mins read
256
1

Cisco AnnualReport 2013
Cisco’s 2013 Annual Security Report reveals that the highest concentration of online security threats come from legitimate destinations visited by mass audiences, namely major search engines, retail sites and social media outlets. 0.5 percent of malware encountered on the web is related to mobile operating systems. The acceptance of the Android platform in the mobile market has led to an explosive growth of malware targetting the platform. With BYOD becoming an accepted trend, 95% of organizations globally already let employees utilize their own devices in the workplace. This has seen employees use the devices for both personal and business activities. Issues which arise in such a scenario include potential loss of confidential company data as IT departments have less control over these devices. Companies in 2013 will have to ensure that devices have business application and data isolated and protected.

The top sources of spam worldwide are India, US, Korea, China and Vietnam. Prescription drugs and luxury watches are the most spammed brands with spammers targeting real-world events with specific and short-lived campaigns.  This include the Windows software targetted during the release of the Microsoft Windows 8 consumer preview and  tax software which was the focus of spammers during the U.S. tax season.  Spam volume dropped 18 percent from 2012 to 2011, with spammers working for a 25 percent drop in spam over the weekend. Majority of spam sent in 2012 happened during the workweek with Tuesday being the heaviest spam day of the year.

More people and devices are connecting to the Internet introducing several points susceptible to attack across corporate and service provider networks. This creates a need for more sophisticated security approaches. Any network-aware device can now connect to any cloud and any application across any network.  By 2020, with an Internet open to an estimated 50 billion things, the number of connections balloons to over 13 quadrillion. These new connections generate data in motion that needs to be protected in real time as it is evaluated for actionable insights through the network and before it’s compromised and causes irreparable damages.  For network security professionals, the focus becomes content-neutral plumbing shifting from the endpoint and the periphery to the network.

Tags: BYODCiscoInternet of Things (IoT)
SendShare146Tweet92
Carlos Ageng'o

Carlos Ageng'o

Bringing you news on information systems, business intelligence and IT innovations. Contact me on @aKhadiemik and c [dot] agengo [at] techweez [dot] com

Related Posts

Data Breach

Massive Data Breach Exposes 2.7 Billion IoT Device Records

February 17, 2025
Telecom Technicians in Kenya: CA Introduces Modernized Licensing Guidelines

New Licensing Rules Proposed for Kenya’s Telecom Engineers and IT Experts

December 24, 2024
Clayton Naidoo, General Manager for Sub-Saharan Africa - Cisco

ICT Authority Picks Cisco as Partner in Digital Master Plan Implementation

April 4, 2023
Near 8000 Students and Civil Servants Benefit From Ajira Digital and Cisco Partnership

Near 8000 Students and Civil Servants Benefit From Ajira Digital and Cisco Partnership

February 25, 2021
MTN Managed Services

IOT, 5G and the Need for Everything as a Service

March 16, 2020
Smart fridges KBL

Safaricom Pushes the Internet of Things Agenda with Smart Coolers for Kenya Breweries

November 21, 2019

Latest

Samsung QLED TVs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025
Apple Smart Glasses

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025
Safaricom

Safaricom Breaks Barriers with $3B Milestone and Bold Ethiopia Play

May 9, 2025
Private Number calls

How to Handle Private Number Calls in Kenya

May 8, 2025
Kenya Power EV charging stations

Kenya Power Rolls Out 45 EV Charging Stations Across the Country

May 8, 2025
Bayobab

MTN’s Bayobab Connects Uganda and Kenya with New Fiber Route

May 8, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

May 9, 2025

Apple Is Making Its Own Chip for Smart Glasses Coming by 2027

May 9, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

5 Most Reliable Virtual Dollar Card Providers in Nigeria

More News

Starlink Is Expanding in Africa Through New Airtel Partnership

Android May 2025 Security Update Fixes Critical FreeType Zero-Click Vulnerability

Court Ruling Orders Worldcoin to Delete All Kenyan Biometric Records

Smartphone Market Recovers Slightly in Q1 2025 With Apple, Vivo Leading Gains

GTA 6 Trailer 2: Rockstar Confirms Release Date and Dual Protagonists

YouTube Now Lets Two People Share a Premium Plan

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.