2017: Cybersecurity At A Turning Point

Cybersecurity threats are becoming more intelligent, autonomous and difficult to detect, creating an urgent need for accountability. 

In today’s society, the digital footprint of both businesses and individuals is increasing dramatically. Although the expansion of this digital landscape has presented exciting opportunities for many, it has also resulted in a growth of the potential attack surface for cyber-criminals.

In this digitally changing climate, everything has become a target and anything can be a weapon. On the front line, we’re seeing cyber-security threats becoming more intelligent, autonomous and difficult to detect, creating an urgent need for accountability, at multiple levels, in order to avoid detrimental effects for the global digital economy. As cyber threats evolve, so must the way that we react to and deal with them.

The following predictions are from the FortiGuard Labs threat research team, made up of over 200 expert researchers and analysts from around the world who discover, study and protect against the latest cyber threats. Using data collected from more than two million sensors around the globe, they protect more than 290,000 organisations a day.

1.    From smart to, Smarter: automated and human-like attacks will demand more intelligent defence

Until now, the majority of malware has only been programmed with a specific objective or set of objectives. Cyber-criminals have counteracted the limits of this by either targeting a specific target or sending vast amounts of malware simultaneously in the hope that it will eventually find itself on a device that it can exploit.

However, in 2017, we predict the development of malware designed to be ‘human-like,’ in the sense that it will be increasingly adaptive, programmed with success-based learning.

This new malware, which utilises a code that is a precursor to artificial intelligence, will be situation-aware and therefore able to identify targets, choose methods of attack and, most importantly, avoid detection. As this malware is designed to proactively spread between multiple platforms, attacks will be more efficient with a larger variety of victims.

2.    Internet of Things (IoT) manufacturers will be accountable for security breaches

With over 20 billion IoT devices predicted to be online by 2020, an increase in the number of attacks targeting them is inevitable. In the past, cyber-criminals have had much success simply exploiting known credentials such as default usernames and passwords. However, our prediction is these attacks will be designed specifically to exploit the weaknesses of the IoT communications and data gathering chain.

If manufacturers do not better protect their devices, then consumers will come to fear cyber-security threats, will be less likely to purchase them as a result, leaving a potentially devastating effect on the digital economy.

FortiGuard Labs predicts that device manufacturers will be held more accountable for their devices by consumers and vendors alike.

3.    20 billion IoT devices are going to be the weakest link in cloud security

Today, the use of cloud-based computing, storage and processing is rapidly increasing. The weaknesses in cloud-based security do not lie in its architecture. They instead lie in the ever-increasing number of endpoint devices accessing cloud resources.

Cloud security relies upon controlling which devices can access a network and how much they can access. Attacks which exploit endpoint devices, and can target and breach cloud providers, will therefore increase dramatically in 2017. Malware could also be injected into the cloud-based offerings by compromised endpoint devices in a process known as cloud poisoning.

This breach of cloud security could radically affect the current mass migration to the cloud and organisations will, instead, adopt increasingly fabric-based security strategies.

4.    Attackers will begin to turn up the heat in smart cities

The essential components of smart cities, such as intelligent traffic control, on-demand streetlights and building automation systems, are all created in an effort to further increase convenience for humans. However, by creating a community that is so interconnected online, you also create a huge surface for potential cyber-attacks.

By increasing the number of integrated systems in a city, you also increase the potential for civil disruption on a massive scale if any of them are compromised. FortiGuard Labs predict that, as these systems are considered a high-value target for hackers, attacks are likely to increase.

5.    Ransomware attacks will bring higher costs

It’s worth noting that many old threats are returning as slightly different variants. While ransomware is not a new occurrence, the market for it is growing and changing.

2017 will bring an increase of ransomware against high profile targets, such as celebrities, political figures and large organisations. These attacks are likely to include a collection of personal and sensitive data that can be used to blackmail the victim. We also expect the ransom costs for these attacks to get much higher as a result.

Automated attacks will also become more common, as they allow hackers to cost-effectively manage their schemes by demanding a small amount of money from large numbers of victims simultaneously.

6.    Technology will have to close the gap on the critical cyber skills shortage

Nowadays, almost any business looking to establish itself needs to be online in some shape or form. However, this growth of online presence is surpassing the number of skilled cyber-security professionals. Therefore, many organisations establishing themselves online for the first time lack the experience and training to develop a suitable security policy and protect critical assets which now move freely between network environments.

Our final prediction is that this lack of in-house skilled cybersecurity professionals will result in organisations turning to consulting services or security service providers in order to establish and protect themselves online.

The expanding attack surface created by cloud technology and IoT devices, combined with the global shortage of cyber-security talent continues to drive cyber threats. The pace of these changes is unprecedented; resulting in a critical tipping point as the impact of cyber-attacks are felt well beyond their intended victims in personal, political, and business consequences.

Going forward, the need for accountability at multiple levels is urgent. Without swift action, there is a real risk of disrupting the progress of the global digital economy.

ITProportal:                    Information Commissioner talks GDPR and accountability:  

What Does Brexit Mean For British Data Privacy?:

 

 

« ‘Magic’ Ransomware Is Based On Open-Source Code
Internet Has Changed The Media Business Model »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

Infoblox

Infoblox

Infoblox solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.

ADF Solutions

ADF Solutions

ADF Solutions is a leading provider of digital forensic and media storage exploitation tools.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

Dcoya

Dcoya

Dcoya's complete security awareness training program gives you out-of-the-box compliance with PCI-DSS, HIPAA, SOX and ISO regulations.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Securis

Securis

Securis provides organizations and agencies with the highest level of professional, ultra-secure data destruction and IT recycling.

GrrCON

GrrCON

GrrCON is an information security and hacking conference that provides the Midwest InfoSec community with a fun atmosphere to come together and engage with like minded people.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

Q6 Cyber

Q6 Cyber

Q6 Cyber is an innovative threat intelligence company collecting targeted and actionable threat intelligence related to cyber attacks, fraud activity, and existing data breaches.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

Lumifi

Lumifi

Lumifi provide end-to-end cybersecurity resilience solutions with a specialty in managed detection and response (MDR) services.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Oxford Information Labs (OXIL)

Oxford Information Labs (OXIL)

Oxford Information Labs brings together world-class software programmers and policy experts to provide a unique mix of expertise and hands on technical solutions.