The enterprise threat landscape: Are you safe?

A red padlock with a binary code label surrounded by circuits.

Security is a permanent resident on the agenda of all business and technology decision makers.

In our first quarterly report focused on security, we looked at some of the key threats and how to mitigate the associated risks.

This report moves the story on and takes a look at the enterprise threat landscape as it stands in 2013.

Download the latest IT Pro report here.

What areas should you be sitting up and paying attention to? What areas can you afford to pay a little less attention to? We try to cover off all those questions and more.

In this IT Pro quarterly report, Caroline Donnelly takes a look at the state of the market.

She spoke to many industry experts to get their opinion on what the key threats are and how the market view has changed over the last 12 months.

Some of the old threats are still hanging around like bad smells, but there are some new and emerging threats to get enterprises worried, too.

As Jane McCallion discovered, such new threats include cyber crime-as-a-service. Far from being a hobbyist activity, cyber crime is now big business, with the bad guys forming networks and causing serious damage in exchange for serious cash.

Technology, rather than traditional weapons, is fast-becoming the next big battleground.

DDos attacks are also becoming more prevalent and causing security headaches for businesses, as we discover in our Q&A with David Emm, a senior security researcher at our report sponsor Kaspersky Lab.

Rene Millman looks at how to avoid damage to reputation and data by ensuring you're always in fine security fitness, providing tips, hints and expert guidance.

We also take a look at cyber terrorism and how technology, rather than traditional weapons, is fast becoming the next big battleground. It makes scary, but very necessary, reading.

Stephen Pritchard also causes a bit of a stir by focusing in on the real weakest link: employees.

Yes, that's right, the insider threat is still one of the biggest issues companies face. And it's not always disgruntled employees wishing bad things on their firms, it's quite often unintentional bad habits that create vulnerabilities. Of course, as we find out in this report, the bad guys are increasingly hacking' humans too and exploiting our weaknesses to get to a company's biggest assets.

As with all our IT Pro reports, you can read this on your desktop, mobile, tablet or simply print it out to digest later on. We hope you find the information inside useful as you step up your fight against the bad guys by deploying good technologies and best practice.

ITPro

ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.