When it comes to cybersecurity the primary enemy is integration. Without integration, all our applications and systems would be inherently secure. Alas, most applications only provide business value when they are connected to another application. The inherent problem that creates from a cybersecurity perspective is any IT environment is only as robust as its weakest application link.
An Accenture Technology Vision 2019 report published this month highlights how problematic this integration has become. The report finds that only 29 percent of the 6,672 business and IT executives surveyed know whether partners are working as diligently on security and compliance as they are. Cybercriminals are constantly scanning for vulnerabilities within organizations that can treat as a gateway to penetrate a larger ecosystem. Even ecosystems manage by industry behemoths such as Apple and Google are vulnerable. It was revealed this week that more digital pirates are creating clones of applications that wind up being deployed on the Apple Store because the credentials of developers have been compromised. Google and Microsoft are dealing with a similar issue. Cryptominers have embedded their malware in applications being downloaded via Google Play and the Microsoft Store.'Without integration, all our applications and systems would be inherently secure. Alas, most applications only provide business value when they are connected to another application.' ~ Mike VizardClick To Tweet
Mike Vizard has covered IT for more than 25 years, and has edited or contributed to a number of tech publications including InfoWorld, eWeek, CRN, Baseline, ComputerWorld, TMCNet and Digital Review. He currently blogs for IT Business Edge and contributes to CIOinsight, The Channel Insider, Programmableweb and Slashdot. Mike also blogs about emerging cloud technology for SmarterMSP.