• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Physical Security, Video

Takeaways and Best Practices from Cisco’s Midyear Security Report

John N. Stewart speaks about the biggest security threats found in the report.

September 3, 2014 TD Staff Leave a Comment

Takeaways from the report:

  • The growth of Malvertising adds which hackers use to attack straight from the website, without need of clicking on the malicious advertisement. Media and publishing companies are being targeted, with Malvertising ads placed on their websites that infect their customers.
  • Every multinational company included in the report has activity on their sites that they don’t want happening. There are indications of traffic that shouldn’t be there, and machines that have been touched by outside sources, likely hackers.
  • Pharmaceutical, petrochemical, food and beverage, and aviation industries are being hit the hardest right now.
  • All of the traditional practices that security officers have had for decades, such as firewalls, don’t translate well into the new generations of issues
  • The hacking community hasn’t gone away, there are increases in activity, and they are focusing on high, profitable criminality and destruction.
  • The single biggest way that machines are being affected is through a lack of updated software. This is more concerning as many devices, from TVs to refrigerators, carry their own IP and software.

How to protect yourself:

  • Keep software updated!
  • Somebody has to look out for you besides you. You need an outside observer looking out for your security, because there are blind spots that you won’t see internally. Subscribe or partner with others to keep an eye on security.
  • The arrest of Paunch, the author of the BlackHole Exploit Kit, has sent ripples through the hacking community. However, this means security officers must keep an eye out for the inevitably competitive exploit kits that will now be developed in Paunch’s wake.
  • Find your vulnerabilities, and when you do, fix them. Just knowing isn’t enough, and as long as you are vulnerable hackers will exploit you.
  • In security, you are either preventing something, handling something, or cleaning up. This is the way you should think about it.
  • Security is being treated as an IT problem, and not as a part of the business practice. We need the criticality of security to move to the boardroom. Once it becomes a business process, it will be handled the way it needs to be.

Download Cisco’s 2014 Mid-Year Security Report here.

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Corporate

Related Content:

  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • ADI SnapOne logos Snap One, ADI Expands Conferencing Solutions with Yealink…
  • AV/IT Integration trends, Big Data Technology for Business Finance Analytic Concept. , 2020 Enterprise IT trends, Top AV/IT Integration Trends Shaping Enterprise Operations in…
  • Students (6-7, 8-9, 10-11) video chatting with another class How I’m Utilizing Technology to Help Transform Education…

Free downloadable guide you may like:

  • Practical Design Guide for Office SpacesPractical Design Guide for Office Spaces

    Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-face time with co-workers. When designing the office spaces — and meeting spaces in particular — enabling that connection between co-workers is crucial. But introducing the right collaboration technology in meeting spaces can […]

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.