What Are The Big Cyber Threats In 2017?

As the end of 2016 approaches, we enter the period when security vendors publish their predictions for what cyber threats may emerge in 2017. Whilst 2016 will be remembered as the year of the data breach, several obvious threats are likely to feature in the next 12 months:

Mobile -Whilst a predicted rise in attacks against mobile devices has been repeatedly predicted for a number of years, many experts believe that 2017 really will be the year of significant attacks against mobile devices. As this threat continues to grow and businesses increasingly utilise Bring Your Own Devices in the workplace, corporate breaches that originate on mobile devices will become a more significant corporate security concern.

Internet of Things (IoT) -The threat from IoT devices has been starkly highlighted in the past few weeks with the creation and exploitation of IoT botnets used in record breaking DDoS attacks. 

A botnet variant called Mirai was identified by security firms as being the tool used to find and compromise insecure IoT devices. The ability to bring down some of the world’s biggest websites and more recently an entire nation’s (Liberia) internet connection suggests that DDOS attacks using IoT botnets are likely to grow even larger in scale.

As more IoT devices are connected in 2017, the threat surface will increase accordingly.

Cloud -An attack to disrupt or take down a major cloud provider has the potential to affect a number of customers’ businesses. As more organizations start to utilise cloud services, these attacks are likely to start finding their way into this new infrastructure, either by encrypted files spreading cloud to cloud or by malicious actors using the cloud as a volume multiplier.

Ransomware -In 2016 the threat from Ransomware rose dramatically with more advanced variants bringing in millions of Dollars of ransom money to cybercriminals. Ransomware is highly effective and is now the most profitable malware type in history. New variants of the malware are likely to aim for higher value targets next year such as company databases. By hitting an organisation where it hurts the attackers will be able to demand more ransom money.

Can you counter these threats?

No-one can 100% guarantee that you won’t fall victim to these threats, but you can reduce them dramatically by implementing relatively simple measures such as ensuring you have a plan in case disaster strikes and ensure that you regularly backup your most important data.

Education

According to the UK government, developing a cyber aware culture through training can reduce the cyber threat by as much as 80%.

With New EU (GDPR) legislation is due to come into force in May 2018 that will severely punish organisations that do not adequately protect their customer’s data it would be a good idea to get your organisation as secure as possible.

You can greatly reduce the cyber threat through education. Course such as our Cyber Security Fundamentals and Cyber Executive Awareness courses teach execs and employees the basics of cyber security. They give an overview of the cyber threat landscape, threats and the associated risks with cyber and the impact a breach can have on both businesses and individuals.

PGI Cyber:     2016 Trends in Cyber Crime:
 

 

« AI Beating Humans? Not In My lifetime, Says Google Chief
Half The World's Population Is Not Yet On The Internet. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

Waterfall Security Solutions

Waterfall Security Solutions

Waterfall Security is focused on protecting critical infrastructure and industrial control systems from remote online cyber attacks,

Marsh

Marsh

Marsh is a global leader in insurance broking and risk management and has been a leader in combatting cyber threats since their emergence.

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

Mitek Systems

Mitek Systems

Mitek's global mobile capture and identity verification technology optimizes the digital user experience for thousands of financial services organizations.

miniOrange

miniOrange

miniOrange is a cloud and on-premise based identity and access management (IAM) solution provider.

IAR Systems

IAR Systems

IAR Systems are a frontrunner in a changing industry, and a future-proof software supplier enabling the IoT.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

Private Machines

Private Machines

Private Machines develops unique patent-pending technology protects cloud and data center workloads.

BlackhawkNest

BlackhawkNest

Blackhawk is the only cyber security solution on the market that combines network monitoring and incident response into a cohesive appliance.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Acronis

Acronis

At Acronis, we protect the data, applications, systems and productivity of every organization – safeguarding them against cyberattacks, hardware failures, natural disasters and human errors.

Sitehop

Sitehop

Sitehop is a cybersecurity technology company developing and supplying FPGA hardware-enforced cyber security solutions for networks.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

SecureWeb3

SecureWeb3

SecureWeb3 helps businesses and brands to secure their Web3 presence by offering a full suite of security services including training, consultancy & brand protection solutions.

Waterleaf International

Waterleaf International

Waterleaf provide advanced network and cybersecurity solutions - informed by data sciences. Transforming Connectivity, Security and Information for Municipalities, Government & Enterprise.