VoIP systems will also see an increasing volume of threats, the report said, with SPIT (spam over Internet Telephony) helping to create new opportunities for hackers to market the end-user data they gather to telemarketers. Another emerging attack format will be threats delivered via spoofed VoIP accounts, much as malware writers and spammers have distributed their work over e-mail and the Web, according to the report.
The increased adoption of RFID technologies will also pose new security risks, the researcher said, with many current RFID devices vulnerable to eavesdropping, recording, cloning, and forgery. McAfee said that RFID readers could also contain vulnerabilities that might allow chips loaded with exploits to steal information from the back-end systems to which the readers are linked.
The Sage report continues on to outline continued growth of spam and spyware, two of the most publicized issues in the IT world today, and raises questions over the efficacy of security features added to Microsoft's newest Windows Vista operating system.
In a nod to another high-profile problem plaguing enterprise businesses, the research also delves into the issue of data leakage. Incidents like retailer TJX Companies' systems intrusion that allowed hackers to make off with over 45 million consumer records, many of which contained sensitive credit card data, will occur more frequently, Marcus said.
As the incidents pile up and lawmakers respond with new legislation aimed at punishing companies that cannot protect sensitive data, businesses will be actively seeking technologies that help address the problem, according to McAfee.
One of the issues caused by this trend will be IT executives who move to add new technologies without considering all the alternatives and before creating the policies necessary to be successful at defending their information, according to the researcher.
"This influx of new technologies might be overwhelming with lots of point products being marketed as the solution to this problem, but people need to step back and take a long look at how they manage data from a macro point of view if they want to improve protection," said Marcus.
"A lot of the solutions might come from technologies that are far from new," he said. "Host-based intrusion protection isn't new, but we see it being applied in new and interesting ways to address data exposure, and encryption has been around forever, but rarely has it been correctly understood or applied."