- Mobile devices.
- Public cloud.
- Cloud infrastructure.
- User behavior.
Security professionals who participated in Cisco’s third annual Security Capabilities Benchmark Study cited all those elements as top sources of concern when they think about their organization’s risk of exposure to a cyberattack (
Figure 1).
This is understandable: The proliferation of mobile devices creates more endpoints to protect. The cloud is expanding the security perimeter. And users are, and always will be, a weak link in the security chain.
As businesses embrace digitization — and the Internet of Everything (IoE) begins to take shape —defenders will have even more to worry about. The attack surface will only expand, giving adversaries more space to operate.