• Latest
  • All
  • How To
Cisco 2013 Annual Security Report Expanding Connectivity Has Significant Impact on Online Threats

Cisco 2013 Annual Security Report Expanding Connectivity Has Significant Impact on Online Threats

May 18, 2013
Bitchat

Jack Dorsey Launches Bitchat, a Bluetooth-Only Messaging App

July 10, 2025
YouTube AI slop is getting demonetized

YouTube Declares War on Low-Effort AI Videos via Demonetization

July 10, 2025
Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
DHgate Tablet Cases deals
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025
galaxy z fold7-galaxy z flip7-samsung

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

July 10, 2025
GTA VI

Rockstar May Be Testing 96-Player Servers for GTA 6

July 10, 2025
Former X CEO, Linda Yaccarino

Linda Yaccarino Steps Down as CEO of X After Two Years

July 9, 2025
Apple-WWDC25-iOS-26

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

July 9, 2025
Official document handover by Bernard Mwonyonyo and Habib Lukaya from Roam.

E-Mobility in Kenya Gets a Lift with New Bike Financing Program

July 9, 2025
Samsung

This Samsung Security Update Could Change How You Use Your Phone

July 9, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Cisco 2013 Annual Security Report Expanding Connectivity Has Significant Impact on Online Threats

Carlos Ageng'o by Carlos Ageng'o
May 18, 2013
in News
Reading Time: 2 mins read
256
1

Cisco AnnualReport 2013
Cisco’s 2013 Annual Security Report reveals that the highest concentration of online security threats come from legitimate destinations visited by mass audiences, namely major search engines, retail sites and social media outlets. 0.5 percent of malware encountered on the web is related to mobile operating systems. The acceptance of the Android platform in the mobile market has led to an explosive growth of malware targetting the platform. With BYOD becoming an accepted trend, 95% of organizations globally already let employees utilize their own devices in the workplace. This has seen employees use the devices for both personal and business activities. Issues which arise in such a scenario include potential loss of confidential company data as IT departments have less control over these devices. Companies in 2013 will have to ensure that devices have business application and data isolated and protected.

The top sources of spam worldwide are India, US, Korea, China and Vietnam. Prescription drugs and luxury watches are the most spammed brands with spammers targeting real-world events with specific and short-lived campaigns.  This include the Windows software targetted during the release of the Microsoft Windows 8 consumer preview and  tax software which was the focus of spammers during the U.S. tax season.  Spam volume dropped 18 percent from 2012 to 2011, with spammers working for a 25 percent drop in spam over the weekend. Majority of spam sent in 2012 happened during the workweek with Tuesday being the heaviest spam day of the year.

More people and devices are connecting to the Internet introducing several points susceptible to attack across corporate and service provider networks. This creates a need for more sophisticated security approaches. Any network-aware device can now connect to any cloud and any application across any network.  By 2020, with an Internet open to an estimated 50 billion things, the number of connections balloons to over 13 quadrillion. These new connections generate data in motion that needs to be protected in real time as it is evaluated for actionable insights through the network and before it’s compromised and causes irreparable damages.  For network security professionals, the focus becomes content-neutral plumbing shifting from the endpoint and the periphery to the network.

Tags: BYODCiscoInternet of Things (IoT)
SendShare146Tweet92
Carlos Ageng'o

Carlos Ageng'o

Bringing you news on information systems, business intelligence and IT innovations. Contact me on @aKhadiemik and c [dot] agengo [at] techweez [dot] com

Related Posts

Data Breach

Massive Data Breach Exposes 2.7 Billion IoT Device Records

February 17, 2025
Telecom Technicians in Kenya: CA Introduces Modernized Licensing Guidelines

New Licensing Rules Proposed for Kenya’s Telecom Engineers and IT Experts

December 24, 2024
Clayton Naidoo, General Manager for Sub-Saharan Africa - Cisco

ICT Authority Picks Cisco as Partner in Digital Master Plan Implementation

April 4, 2023
Near 8000 Students and Civil Servants Benefit From Ajira Digital and Cisco Partnership

Near 8000 Students and Civil Servants Benefit From Ajira Digital and Cisco Partnership

February 25, 2021
MTN Managed Services

IOT, 5G and the Need for Everything as a Service

March 16, 2020
Smart fridges KBL

Safaricom Pushes the Internet of Things Agenda with Smart Coolers for Kenya Breweries

November 21, 2019

Latest

Bitchat

Jack Dorsey Launches Bitchat, a Bluetooth-Only Messaging App

July 10, 2025
YouTube AI slop is getting demonetized

YouTube Declares War on Low-Effort AI Videos via Demonetization

July 10, 2025
Why Can'y You Register a Safaricom SIM Card After 7 PM

Why You Cannot Register a Safaricom SIM Card After 7 PM

July 10, 2025
Former Safaricom Chief Enterprise Business Officer, Cynthia Karuri-Kropac

Frankline Okata Takes Over as Cynthia Karuri-Kropac Exits Safaricom PLC

July 10, 2025
AI

OpenAI and Perplexity Launch Browsers to Rival Google Chrome

July 10, 2025
Vivo-Y29-4G

Vivo Y29 Launches in Kenya at KES 23,999

July 10, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Jack Dorsey Launches Bitchat, a Bluetooth-Only Messaging App

July 10, 2025

YouTube Declares War on Low-Effort AI Videos via Demonetization

July 10, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

Samsung Unveils Galaxy Z Fold7 and Z Flip7 with Bigger Screens

Rockstar May Be Testing 96-Player Servers for GTA 6

Linda Yaccarino Steps Down as CEO of X After Two Years

iPhone Users Are Not Too Happy With the iOS 26 Liquid Glass Design

E-Mobility in Kenya Gets a Lift with New Bike Financing Program

This Samsung Security Update Could Change How You Use Your Phone

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.