Information Technology is going through a transition period. On the one hand, companies are launching novel devices with the aid of new technologies. Products with multiple features that add to the convenience and enhance user experience, are finding their way into the homes of eager customers. On the other hand, cybercriminals are finding new ways to steal data and disrupt services. As New Year dawns, the tug-of-war between IT developers and cyber-criminals is likely to intensify further.The current year saw consolidation in the IT industry leading to large number of acquisitions. For instance, Symantec acquired four security companies – Gideon Technologies, PGP Corporation, GuardianEdge and the security business of VeriSign during the current year. The acquisition was aimed at widening the company’s security portfolio, adding information security solutions and website certification services. The consolidation attempts in the IT industry may result in development of more secured products However, consolidation alone may not be sufficient in the fight against cybercrime. The progress of the emerging technologies depends largely on their resistance to security breach attempts. Information security awareness training is crucial to ensure data security and integrity. Several developing countries are at the initial stages of IT development. Governments of these countries can collaborate with international bodies to provide online video training to improve computer education among their citizens.Lack of awareness on threats prevalent in the IT environment and lax attitude towards IT security are some of the major causes for rising instances of cybercrime. Most of the security breaches require user intervention. Non-IT organizations may conduct workshops that provide computer security introduction to their employees. They may also organize regular training sessions to update the staff on the latest threats in the IT environment and recommend safe computing practices. Internet users must adhere to the guidelines such as strong passwords, regular software updates, back up data, configuring suggested settings on web browser, use of genuine software and proper use of storage devices to ensure safe computing.