{"id":1586,"date":"2014-03-28T11:01:46","date_gmt":"2014-03-28T11:01:46","guid":{"rendered":"http:\/\/kasperskydaily.com\/b2b\/?p=1586"},"modified":"2019-11-15T07:21:30","modified_gmt":"2019-11-15T12:21:30","slug":"security-landscape-a-view-from-kaspersky-lab","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/security-landscape-a-view-from-kaspersky-lab\/1586\/","title":{"rendered":"Security landscape: a view from Kaspersky Lab"},"content":{"rendered":"<p>How well do you know computers? Or, let\u2019s say, microwave ovens? Smartphones or cars? When it comes to answering any of these questions, there can be many different points of view. Let\u2019s take tablets, for example. I own one, and this means that I use it for work tasks, communication, movies and music, and, not to mention, games. I know which applications I need, how to install, tune and use them. Does this mean that I\u2019m a professional when it comes to mobile devices? Not really. An engineer will see a tablet as a combination of hardware, operating system and software, and will be able to discern a good display from a fair one by using special tools like a color calibrator. A manufacturing specialist will notice how complicated it is to combine aluminum, glass and electric circuitry into such a small device, while maintaining quality and keeping costs low.<\/p>\n<p>It\u2019s important to know the general direction in which the ever-lasting battle of cyber-good vs. cyber-evil is heading.<\/p>\n<p style=\"text-align: left;\" align=\"center\">Things are complicated. This statement sounds \u00a0obvious, but I\u2019m bringing this up \u00a0because there are lots of things going on behind the scenes \u00a0in many industries and on productions and large projects. Now let\u2019s see how complicated security matters are. First, there is the software component. While one person is trying to steal or destroy your data, another is protecting you. Second are the people, the potential victims and attackers and the ways in which they interact. Third would be the hardware and market trends like BYOD, widespread Internet adoption and smart mobile devices. Your employees require new types of tools, but cybercrooks discover new ways to steal, destroy and extort money, while we as a security vendor have to adapt all of this into our protection strategy.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1587\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/03\/06015932\/Kaspersky_Security_Landscape.png\" alt=\"Kaspersky_Security_Landscape\" width=\"800\" height=\"415\"><\/p>\n<p>You can\u2019t be 100% sure that you are fully protected from all types of threats because there are just too many of them. \u00a0I am not trying to say: \u201cBuy our protection solution and forget about it.\u201d It just doesn\u2019t work like that when it comes to security, as things like employee education are as important as intelligently deployed protection products. You have to know the general direction in which the ever-lasting battle of cyber-good vs. cyber-evil is moving.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-1588\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2014\/03\/06015931\/Kaspersky_Security_Landscape_2.png\" alt=\"Kaspersky_Security_Landscape_2\" width=\"967\" height=\"514\"><\/p>\n<p>So, where to start? We have recently simplified the process of learning the key trends by squeezing all-important information into just 13 (very intense) slides. You can see some of them here and view full presentation below or directly at <a href=\"https:\/\/www.slideshare.net\/secret\/GBf5MfQS9pNLap\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Lab\u2019s Slideshare channel<\/a>. Please know that we are always ready to provide any level of detail for you all the way from \u201cbeginner\u201d to \u201cengineering and manufacturing\u201d. You can inquire at your local Kaspersky Lab office or here in the comments. Another thing that we have added are facts that will hopefully support your decision on becoming a Kaspersky Lab customer.<\/p>\n<p><iframe src=\"\/\/www.slideshare.net\/slideshow\/embed_code\/32809516\" width=\"427\" height=\"356\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" style=\"border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;\" allowfullscreen> <\/iframe> <\/p>\n<div style=\"margin-bottom:5px\"> <strong> <a href=\"https:\/\/www.slideshare.net\/KasperskyLabGlobal\/the-evolving-threat-landscape-32809516\" title=\"The Evolving Threat Landscape\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">The Evolving Threat Landscape<\/a> <\/strong> from <strong><a href=\"http:\/\/www.slideshare.net\/KasperskyLabGlobal\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Lab <\/a><\/strong> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>How well do you know computers? Or, let\u2019s say, microwave ovens? Smartphones or cars? When it comes to answering any of these questions, there can be many different points of<\/p>\n","protected":false},"author":53,"featured_media":16225,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[783,2077],"class_list":{"0":"post-1586","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-business-security","10":"tag-security-landscape"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-landscape-a-view-from-kaspersky-lab\/1586\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-landscape-a-view-from-kaspersky-lab\/1586\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-landscape-a-view-from-kaspersky-lab\/1586\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/business-security\/","name":"business security"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1586","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1586"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1586\/revisions"}],"predecessor-version":[{"id":30991,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1586\/revisions\/30991"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/16225"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1586"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1586"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1586"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}