Cisco’s 2013 Annual Security Report

October 2013 Infrastructure

Findings from Cisco’s 2013 Annual Security Report (ASR) in South Africa revealing that the highest concentration of online security threats come from legitimate destinations visited by mass audiences, such as major search engines, retail sites and social media outlets.

According to Den Sullivan, head of architectures and enterprise, Cisco Emerging Theatre, “Each year, the security threats and defences change as a result of one another. The Cisco Annual Security Report is our expert research, highlighting global threat patterns and trends. Today, we live a blended work-personal life. With more and more devices, the number of end points for network security proliferates quickly. When ‘everything’ is connected, in fact before this, when the acceleration starts, IT organisations in South Africa will need to be ready for security scalability. There are many technologies available to secure today’s networks, and now is the time for South African CIOs to make sure their security is robust as more and more devices connect to their networks. It is important to consider security from the ground up and build it into the network’s intelligence, using the most suitable security standards and protocols.”

Today the trend towards Bring Your Own Device (BYOD) is increasingly impacting IT departments, bringing complexity when it comes to security and IT support. The challenge that South African organisations are facing with BYOD is introducing and managing a solid security strategy.

Security risks rise in businesses are also on the rise because many employees adopt 'my way' work lifestyles in which their devices, work and online behaviour mix with their personal lives virtually anywhere – in the office, at home and everywhere in between.

The Cisco Connected World Technology Report is based on a survey commissioned by Cisco of 1800 Information Technology professionals across 18 countries*:

* 30% of South African respondents said there is no policy on the use of company-issued computers, tablets or smartphones in their organisations.

* Of those in South Africa who indicated their company has a policy on personal usage of company-issued devices, only half indicate they adhere to the policy most of the time.

* Less than 20% of South African respondents adhere to their company’s IT policy all the time.

* Less than a third (21%) of South African respondents use company-issued devices for other activities even though they are supposed to be for work-only.

Android malware

Android malware entered the mainstream consciousness in 2012 with explosive growth and the first documented botnet. Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content and other software. Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software and other malicious programs; the majority of active malware threats are usually worms or trojans rather than viruses.

Spam trends

* Spam volume dropped 18% from 2012 to 2011, with spammers working 'banker’s hours' for a 25% drop in spam over the weekend.

* In 2012, the majority of spam was sent during the workweek – Tuesday was the heaviest spam day of the year.

* The top spoofed brands involve prescription drugs and luxury watches like Rolex and Omega.

* Spammers maximise the ROI of their efforts, targeting real-world events with specific and short-lived campaigns.

* January-March: Windows software, which coincided with the release of the Microsoft Windows 8 consumer preview.

* January-March and September-December: Professional networks like LinkedIn, correlated with the desire for a career change during the beginning and end of the year.

* September-November: Cellular providers around the release of the Apple iPhone 5.

The Internet of everything and security’s future

Looking ahead, the Internet of Everything represents the largest online trend today. As more people, things and devices connect to the Internet, more data from more places will be introduced across corporate and service provider networks, which open up new vulnerabilities and a need for more sophisticated security approaches.

* Exponentially more machine-to-machine (M2M) connections are coming online each day, leading to a proliferation of endpoints that extend far beyond mobile devices, laptops and desktops to an 'any-to-any' scenario in which any device can connect to any cloud to any application across any network.

* These new connections generate data in motion that needs to be protected in real time as it is evaluated for actionable insights through the network and before it’s compromised and causes irreparable damages.

* For network security professionals, the focus becomes content-neutral plumbing – shifting from the endpoint and the periphery to the network.

Read the Cisco 2013 Annual Security Report at http://www.cisco.com/go/securityreport





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Service robot technology for residential complexes
Suprema AI & Data Analytics Infrastructure Residential Estate (Industry)
Suprema has signed a three-party memorandum of understanding (MOU) with Hyundai Motor Group Robotics LAB and Hyundai Engineering & Construction (Hyundai E&C) to collaborate on advancing residential complexes through service robot technology.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
AI projects are failing at alarming rates
AI & Data Analytics Infrastructure
As organisations around the world accelerate their investments in artificial intelligence, digital transformation and data analytics, a growing number of industry experts are warning that many companies are still approaching these initiatives in fundamentally flawed ways.

Read more...
Understanding the Shared Responsibility Model
Infrastructure Security Services & Risk Management
While the cloud can certainly be a growth enabler in many ways, it can also introduce new security risks. Companies want to have a clear understanding of where their security duties end and where their cloud service provider’s begin.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
New commercial and technical appointments at Veeam
News & Events Infrastructure
Veeam Software has announced two senior appointments in its South African business as it continues to invest in local market growth and partner and customer engagement.

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.