IT’s List of Top Security Threats

Came across this article over on Computer World… In this ever increasing complex world it’s nice to know who your threats are. This type of information feeds nicely right into the “businessy” risk-based approaches to addressing security. You could have the most vulnerable system in the world however if there are no threats that want to attack that system it’s sort of a waste of money to add security to protect it. If you don’t think you have any threats though you’ll probably incorrect. It may be worth taking a look at these general categories to assist in identifying threats that may affect your organization or system.

According to the Computer World article, IT’s nine biggest security threats include:

  1. Cyber Crime Syndicates
  2. Small-Time Cons – & the Money Mules/Launders Supporting Them
  3. Hacktivists
  4. Intellectual Property Theft & Corporate Espionage
  5. Malware Mercenaries
  6. Botnets as a Service
  7. All-in-One Malware
  8. Increasingly Compromised Web
  9. Cyber Warfare


Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, SQL server, and so on), broke in using a multitude of vulnerabilities, then explored the compromised company to their heart’s content. Often their intent was exploratory. If they did something illegal, it was typically a spur-of-the-moment crime of opportunity.

My, how times have changed.

When describing a typical hacking scenario, these days you must begin well before the hack or even the hacker, with the organization behind the attack. Today, hacking is all crime, all the time, complete with bidding markets for malware, crime syndicates, botnets for hire, and cyber warfare gone amok.

Continued here.


Do you have other security threats to add to this list? Post your comments below. Today’s post pic is from

20 comments for “IT’s List of Top Security Threats

  1. August 28, 2012 at 12:52 am

    #NoVABlogger IT’s List of Top Security Threats

  2. August 28, 2012 at 1:42 am

    IT’s List of Top Security Threats: Came across this article over on Computer World… In this ever increasing c…

  3. August 28, 2012 at 3:02 am

    Came across this article over on Computer World… In this ever increasing complex world it’s nice to know who you…

  4. August 28, 2012 at 3:09 am

    IT’s List of Top Security Threats |

  5. August 28, 2012 at 3:46 am

    IT’s List of Top #Security #Threats: [] Came across this article over on Computer World… In…

  6. August 28, 2012 at 8:01 am

    IT’s List of Top Security Threats

  7. August 28, 2012 at 2:16 pm

    BLOGGED: IT’s List of Top Security Threats //Nice list to start from.

  8. August 28, 2012 at 8:13 pm

    IT’s List of Top Security Threats

  9. August 28, 2012 at 8:50 pm

    BLOGGED: IT’s List of Top Security Threats //In case U missed.

  10. November 14, 2015 at 3:08 pm

    The presence of a certain piece, ask us massachusetts furniture
    and we want to know to build it up, the furniture grouped together
    to cater your individual needs.

  11. January 22, 2016 at 1:56 am

    By internalizing and making use of this Fact,that your ideas create your actuality,
    you will grant your self the facilkty to create
    the modifications you need to see manifest in your life.

  12. January 31, 2016 at 10:54 pm

    Power systems: Along with heavy compct developmernt machinery, we
    additionally rent power generaors , air conditioners , agricultural gear and more.

  13. April 6, 2016 at 12:11 am

    An auto garage where I useed to do the bay windows,
    would have a film of grease on sometimes, sso I
    got them to clean it for me beforehand!

  14. April 7, 2016 at 1:29 am

    Secondly, for the primary time real property investor it’s alwayus a good
    idea to not buy a property with cash by way oof
    an outright sale, moderately it will likely be
    a good idsea to lease it first after which
    bbuy it.

  15. April 7, 2016 at 2:16 am

    Now, in case you let that leak go and allso you neglect itor when you’ve got been patching
    it and patching it for years, and the insulation has gotten moist iin the meantimethen you may
    have gone past the purpose or repair, and you might now
    have a purpose why you are going tto need to get an entire neww
    hot tar roof.

  16. April 8, 2016 at 1:48 am

    A certified roofer will probably be in a position to check out your
    basement and you’rehigh to let you realize iff the soffits
    are ddoing their job, or inn the event you should use lovers tto help the aair stream.

  17. April 8, 2016 at 1:56 am

    Our damage attorneys have diverse backgrounds, allowing us to assist yoou in a
    variety of legal matters.

  18. May 16, 2016 at 9:10 am

    Peoploe rom all over the world contribute too HubPages
    by sharing words and footage Geet to know uus a bit by studying what everyday people should say about Faahion and
    Beauty , and Tattoos The breadth of content on HubPages is huge, however
    each aarticle iis restricted in its own special method!

  19. October 8, 2016 at 1:39 pm

    Pengiriman lokal perusahaan menyediakan layanan yang terjangkau dalam jarak pendek,
    sementara perusahaan-perusahaan internasional memiliki jaringan pengiriman untuk secara
    efektif transportasi parsel di seluruh negara dan lautan.

  20. October 27, 2016 at 3:47 pm

    As power shortages are becoming more frequent, solar energy is turning ihto extra value-aggressive.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.