Experts Make 2016 Cybersecurity Predictions

In 2015, more than 178 million records on Americans were exposed in cyberattacks, according to the Identity Theft Research Center. The worst of them included the breach of the Office of Personnel Management, which exposed the personal information of 21.5 million people.

Even kids weren't safe. When electronic toymaker VTech was hacked in early December, 6.4 million children's profiles were compromised. Many experts don't believe 2016 will be any better. So what should the public be worried about in the coming year?

Everything from smart fridges to connected Barbies to the Apple Watch found their way into American homes in 2015. That trend should continue in 2016 — something hackers will probably exploit, according to several experts.

"A new frontier of data breach issues is on the horizon," Lane Thames, a security researcher for Tripwire, told NBC News. "It is a result of the growing number of devices that belong to the Internet of Things, a.k.a. the IoT."

While the emergence of new smart products might be exciting, Thames said, "very few of these devices are designed and developed with cybersecurity and data privacy in mind. Often, a skilled hacker can break into a new IoT device within a matter of days, if not hours."

Someone hacking into a car or home appliance is scary enough. But the Internet of Things is becoming a vital part of U.S. hospitals, a problem because the healthcare industry already faces 340 percent more cyberattacks than the average industry, according to a report from Raytheon and Websense Security Labs.

Fear of "false positives and delays" for patients means that 75 percent of hospital network traffic goes unmonitored, the report said, putting connected devices with access to sensitive patient information at risk.

Security firm Trend Micro dubbed 2016 the "year of online extortion." Ransomware infects a computer, and then threatens to lock a user out forever or delete data if the user doesn't pay up.

There will be more of that, Trend Micro said in a recent report. But in the wake of the Ashley Madison hack, where members were outed as possible philanderers, the blackmail could be even worse.

"Cyber extortionists will devise new ways to target its victim's psyche to make each attack personal," predicted Trend Micro.

"Reputation is everything, and threats that can ruin an individual's or a business' reputation will prove to be effective and — more importantly — lucrative."

Even more terrifying, the threat of ransomware and the growing Internet of Things could converge, according to Kaspersky Lab, "begging the question, how much would you be willing to pay to regain access to your TV programming? Your fridge? Your car?"

Greed isn't the only thing motivating hackers. In 2015, Anonymous went after ISIS and the Ku Klux Klan.

"Organizations need to realize that financial gain is no longer the only or even the biggest driver of some of their adversaries," Amit Yoran, president of security firm RSA, told NBC News in an email.

While Anonymous might grab the headlines, lone hackers with muddled motivations will be the bigger threat in 2016, predicted McAfee Labs in a recently published report. The people who hacked Ashley Madison and VTech both claimed they were simply exposing poor security practices. Over the next year, McAfee Labs says to expect "attacks that appear to be inspired by hacktivism but actually have very different, hard-to-determine motives."

Hackers don't need advanced skills or lots of money to cause chaos these days, the McAfee Labs report said, calling modern hacktivism "nothing more than a case of copy and paste." That means any kid with an ax to grind and moderate computer skills could take up the mantle of "hacktivism" and cause the next big security breach.

There is no shortage of private security firms and experts promising to prevent cyberattacks. But 2016 could be the year Uncle Sam takes a stand against hackers — for better or for worse.

"As international cyber threats increase and cyber warfare tactics are increasingly used by America's high profile enemies, ISIS, North Korea, Iran, the pressure to do something at the federal level will provide politicians an attractive issue in an election year," Jeff Hill, channel marketing manager for STEALTHbits Technologies, told NBC News.

Expect new legislation meant to protect sensitive information, Hill said, as well as the possibility that President Barack Obama could appoint something like a "cyber security czar to coordinate efforts to combat national security and corporate espionage-driven attacks."

Not only will the government feel pressure to prevent attacks, it will also need to find ways to help the millions of victims of security breaches — some of whom never learn that their information was exposed.

"With breaches on the rise at all levels from government to the private sector we will see a push for more legislation dealing with reporting and protections," Lamar Bailey, research director for Tripwire's vulnerability and exposures research team, told NBC News.

After as many as 80 million records were compromised in the Anthem breach, the insurer offered free credit monitoring to catch fraud. That isn't enough, Bailey said.

"Credit monitoring is not sufficient for protecting victims of a breach — it is like putting a Band-Aid on a bullet wound," Bailey told NBC News, predicting that the government could require more from hacked companies in 2016.

In the past, many assumed that Apple products were safer from cyberattacks than Windows and Android products. But as Apple's popularity grows — it currently owns 13.5 percent and 7.5 percent of the smartphone and PC markets, respectively, according to market research firm IDC — so too could the company's visibility as a target.

"A rising number of threat actors have begun developing specific malware designed to infect devices running Mac OS X or iOS," wrote Symantec on its website, noting that "Apple-related malware infections" have spiked in the last 18 months.

"Should Apple's popularity continue to grow, it seems likely that these trends will continue in 2016," said Symantec. "Apple users should not be complacent about security and change their perception that Apple devices are 'free from malware.'"
As always, there are steps that people can take to protect themselves, from always updating their software to coming up with a nearly unbreakable password (don't worry, there is an 11-year-old girl who can help you with that).

In 2016, IDC expects that more than 3.2 billion people will have access to the Internet. That is a lot of potential hackers and targets, so don't expect the number of security breaches to come down anytime soon.

NBC: http://nbcnews.to/1Ss9VKD

 

« Cyberwar Represents An Existential Threat
Predictive Analytics Tools Confront Insider Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Nixon Peabody LLP

Nixon Peabody LLP

Nixon Peabody LLP is an international law firm with offices across the USA, Europe and Asia. Practice areas include Data Privacy and Cyber Security.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

Cyversity

Cyversity

Cyversity's mission (formerly ICMCP) is the consistent representation of women and underrepresented minorities in the cybersecurity industry.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

ANSI National Accreditation Board (ANAB)

ANSI National Accreditation Board (ANAB)

ANAB is the largest accreditation body in North America. The directory of members provides details of organisations offering certification services for cybersecurity related standards.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

Solidified

Solidified

Solidified is the largest audit platform for smart contracts. Our community has the highest concentration of top Blockchain security specialists and best-in-class code auditors.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

Cybersecurity Maturity Model Certification Center of Excellence (CMMC COE)

CMMC COE is an IT-AAC sponsored public–private partnership that will be the focal point for entities seeking to achieve Cybersecurity Maturity Model Certification.

Experis

Experis

Experis provide IT resourcing, project solutions and managed services. We enable organizations to cultivate individuals and teams prepared for the digital age.

Smile Identity

Smile Identity

Smile Identity helps businesses confirm the true identity of their users in real-time using any smartphone or computer.

Incyber

Incyber

Incyber is a fully integrated network and cybersecurity solutions provider contracted to safeguard public and private enterprise, high value data and sensitive industries.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Code First Girls

Code First Girls

Code First Girls are on a mission to close the gender gap in the tech industry by providing employment through free education.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.