{"id":2114,"date":"2006-01-24T00:00:00","date_gmt":"2006-01-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/24\/top-security-trends-for-2006\/"},"modified":"2021-12-30T11:40:42","modified_gmt":"2021-12-30T11:40:42","slug":"top-security-trends-for-2006","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/01\/24\/top-security-trends-for-2006\/","title":{"rendered":"Top Security Trends for 2006"},"content":{"rendered":"<p>As a result of working with hundreds of companies on security projects, Chris Thatcher and his teammates at Dimension Data have set forth predictions for the top security trends for 2006.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1.) More damages, but fewer epidemics.<br \/>\n2.) Accelerated legislation, some litigation.<br \/>\n3.) Points of attack move beyond Microsoft&#8217;s Operating System.<br \/>\n4.) Mobile phone and PDA\/ Smartphone virus concerns.<br \/>\n5.) Spyware a major issue.<br \/>\n6.) IM and P2P will become a bigger headache.<br \/>\n7.) Messaging security will get serious.<br \/>\n8.) Data protection energized as publicized data breaches in the United States intensify.<br \/>\n9.) Convergence will accelerate; security becomes embedded in the infrastructure.<\/p>\n<p>http:\/\/www.csoonline.com\/read\/010106\/caveat010906.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2114","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2114"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2114\/revisions"}],"predecessor-version":[{"id":4601,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2114\/revisions\/4601"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}