Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

The Most Important Digital Security Changes Expected in 2017

December 08, 2017

The Most Important Digital Security Changes Expected in 2017


While many of 2016’s the biggest digital security news stories have been focused on the government, rather than those public-facing enterprise hacks of years prior, the lessons to learn from recent digital security news have remained constant. In a world where network communications technology is central to how every aspect of business and daily life is conducted, cybersecurity threats will continue to multiply at a breakneck pace, and digital security needs to be top of mind to every business, no matter the size.

So as we look forward to another year of technological evolution, we anticipate the enhanced efficiency, productivity, and interactivity that it will bring and the increasingly sophisticated threats that will undoubtedly evolve to exploit those advantages. With that in mind, let’s look at some of the big digital security changes that 2017 may bring and what they mean for those selling security solutions.

Enterprises Will See the Importance of Analytics (and Risk Management)

The risk management paradigm that drives cybersecurity analytics adoption is so different from what has existed in computing’s past that the concept is a bit hard for even the tech-savvy to wrap their minds around. Because cybersecurity threats have grown so numerous, it’s both inefficient and ineffective for enterprises to rely on a perimeter security solution to stop every incoming threat. Rather, enterprises need to be able to use cybersecurity analytics tools to understand what’s going on within their networks and deploy resources accordingly, allowing them to both mitigate potential damage and remediate attacks, which would ensure them to allow their networks to resume functioning properly as quickly as possible.

As businesses continue to realize that this model is the only way to approach the onslaught of digital security threats out there, the solution provider, the security consultant, and the cybersecurity analyst are going to play an even more critical role in helping enterprises build out their network architecture and implement policies and strategies that allow them to compute safely amid an incalculable number of threats targeting enterprise networks.

More Companies Will Implement Cloud-Based Security Solutions

The sheer amount of computing resources that today’s digital security threats can leverage means that a single suite of security tools installed in-house is increasingly incapable of handling them. Distributed denial-of-service (DDoS) attacks, for instance, utilize the crowdsourced computing power of thousands, or even hundreds of thousands, of malware-infected devices to overwhelm the bandwidth of a target and crash its Web presence. Using the tremendous amount of space available on the public cloud, cloud-based security solutions can successfully defend against such attacks by diverting this rogue information in ways that in-house solutions can’t, allowing enterprises to weather attacks without their websites going down.  

In 2017, more businesses are going to be aware of what their in-house solutions can’t handle and will be looking toward solution providers to implement and even manage cloud-based security solutions.

Businesses Will Start to Take IoT Security Seriously

In 2016, Internet of Things (IoT) devices really started to move from being championed by tech-savvy early adopters to being fixtures in many homes and offices. But the unfortunate reality of the IoT is that because we don’t tend to think of our wired thermostats, office security systems, or home appliances as being the miniature computers that they are, enterprises and home users have been failing to undertake the basic security protocols to keep the devices from being compromised.

But in 2017, this is going to have to change. The more insecure devices are connected to an office network, the more routes in there are for hackers—and it’s not just compromised enterprises that suffer in the impact. A DDoS attack of a never-before-seen magnitude late in 2016 that took down many popular websites was tied to a botnet that was crowdsourcing its attack from hacked IoT cameras and other devices that capture so much data that it was virtually impossible for security solutions to cope with it.

So to prevent these types of attacks from becoming even more prevalent, debilitating, and destructive, enterprises are going to need to spiff up their IoT security, and they’ll need informed, skilled security solution providers to help them.

What other big digital security changes do you see coming?