2017 Tech Trends: 'A Major Bank Will Fail'

What are the big technology trends to watch out for in 2017? Cybersecurity will undoubtedly be the dominant theme of 2017, as all tech innovations could be undermined by data thefts, fraud and cyber propaganda.

As accusations of Russian interference in the 2016 US presidential election continue to reverberate around the world, hackers, whether private or state-sponsored - would seem to be getting the upper hand.

Prof Richard Benham, chairman of the National Cyber Management Centre, gives a dire warning: "A major bank will fail as a result of a cyber-attack in 2017 leading to a loss of confidence and a run on that bank."

In November last year, hackers stole £2.5m from 9,000 Tesco Bank customers in a raid the UK's Financial Conduct Authority described as "unprecedented".

Last year Tesco Bank seemed to be offering free cash withdrawals to hackers, too. And the more connected the world becomes, think connected cars, smart homes, sensor-laden cities, the more opportunities for hackers to break into the system and wreak havoc.

"The internet of things (IoT) and industrial internet of things (IIoT) will play a larger role in targeted attacks in 2017," says Raimund Genes, chief technology officer at cybersecurity company Trend Micro.

"These attacks will capitalise upon the growing acceptance of connected devices by exploiting vulnerabilities and unsecured systems to disrupt business processes, as we saw with Mirai."

The firm also predicts that throughout 2017 criminals will continue renting out their ransomware infrastructures, the tools that enable hackers to break in to your system, encrypt all your data, then demand a ransom to decrypt it.

Hackers can achieve the same result by knocking out your website or factory control systems in a DDoS [distributed denial of service] attack - flooding your computer servers with so many requests that they cease functioning.

And hackers are not just interested in stealing data and making money from it, warns Jason Hart, chief technology officer in charge of data protection at Gemalto, a digital security company.

They're altering it, with potentially dire consequences. "It's scary, but data integrity attacks have the power to bring down an entire company and beyond; entire stock markets could be poisoned and collapsed by faulty data. "The power grid and other IoT systems, from traffic lights to the water supply, could be severely disrupted if the data they run on were to be altered," he says.

As well as poorly secured devices, gullible humans will continue to be targeted, with so-called "business email compromise" fraud continuing to reap rich rewards for criminals, experts predict.

Simply tricking employees in to transferring funds to criminals' bank accounts is lo-tech but surprisingly effective, with Trend Micro reporting that the average payout in the US was $140,000 (£114,000) last year.

"Cybercriminals are targeting human vulnerabilities," says Prof Benham. "Millions is being spent on technology, but nothing on awareness training."

Artificial Intelligence

AI was the buzzword of 2016 and looks set to dominate 2017 as well, for better or worse.

Enabling machines to learn, adapt to new circumstances and make decisions for themselves, rather than simply obeying pre-programmed instructions or algorithms, seems to present as many disadvantages as advantages.

The pessimists envisage self-programming machines running amok and breaking free of human control, with potentially apocalyptic consequences.

But optimists believe that applying a more restrictive, less autonomous form of machine learning to the wealth of data we are now generating and storing in the cloud could help identify correlations and patterns that were impossible for humans to see before.

And as more devices and sensors become connected, we will learn even more about the world around us. This ability to make sense of all this data could help us cure disease, tackle climate change, grow food more efficiently and generally run our lives in a much smarter, more sustainable way, proponents believe.

Lots was made of customer service chatbots last year, sometimes described erroneously as AI in action, but most of these were actually pretty dumb, merely guessing the most likely answer to fit the question.

Real AI, underpinned by natural language processing, neural networks and machine learning, will understand how humans think, talk, and categorise concepts, making it smarter and easier to interact with.

And the more people who use it, the more data it will have to learn from and the better it will become. So we are likely to see a proliferation of smarter virtual assistants, such as Amazon's Alexa, Google's Assistant, Microsoft's Cortana, Apple's Siri, and newcomers like Viv.

Businesses will use their own versions of these AI assistants to make sense of all the data they now have to cope with.

"With AI we have the opportunity to build decision-support systems that see, hear, understand and collaborate with us to help make decisions faster, more relevant and better informed," says Gayle Sheppard, general manager of Saffron Technology, an Intel-owned cognitive computing firm.

Of course, these always-on listening devices connected to the cloud pose another potential security threat, not to mention privacy concerns over what happens to all the data they're hoovering up.

Cyber-Security Arms Race

And another worry about AI is that hackers will have access to it as well - it's a cybersecurity arms race.

"AI will power malware, and will use data from the target to send phishing emails that replicate human mannerisms and content," warns Andy Powell, head of cybersecurity at Capgemini UK, an IT consultancy.

"Seeming more lifelike, these AI powered attacks will resonate with the target better than ever before, meaning they'll be more likely to fall victim."

There's simply no escaping the cybersecurity issue in 2017.

Augmented and Virtual Reality

While Pokemon Go showed how augmented or mixed reality tech could take the mobile gaming world by storm, 2017 is likely to see more businesses adopting the technology, too.

The marketing opportunities are obvious, with companies like BMW linking up with Accenture and Google Tango to create an app that lets customers visualise what various car models would look like in real-world situations.

Lots of other retailers will be using it to enhance their marketing. But there are plenty of industrial and educational applications, too, with smart glasses and head-up displays enabling workers to follow instructions, read manuals and navigate workplaces more efficiently.

Virtual reality is still primarily for gaming, but when lighter, faster headsets are combined with haptic technologies, training and teaching applications will become more viable, too.

Automation

As AI increasingly takes over from call centre and customer service staff, and automation continues its takeover of manufacturing, the big question is what new jobs there will be for all these redundant workers.

We've already seen how the effects of globalisation and automation have stirred up voters in the US and potentially across Europe this year.

Could there be a new Luddite revolution brewing? After all, who benefits most from cheaper production? It's certainly not the poor.

"We're going to start confronting some hard truths about technology and the labour force," says Tien Tzuo, founder of subscription technology platform Zuora. "We're going to have to figure out how to create jobs for people in this new economy, and if there literally are going to be fewer jobs, then we'll need to establish some sort of living standard or basic income for people."

So 2017 could also be the year the world is forced to deal, finally, with the tangible impacts of technology upon human society.

BBC:           Tesco Could Have Been Facing £2bn Fine After The Bank Hack

 

« Watson For Cybersecurity
Hackers Target France’s Presidential Election »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

SecureAuth

SecureAuth

SecureAuth delivers cutting edge identity and information security solutions for cloud, mobile, web, and VPN systems.

Eversheds Sutherland

Eversheds Sutherland

Eversheds Sutherland is a global multinational law practice offering a full range of commercial and IT law services including Privacy, Data Protection and Cyersecurity.

Cryptus Cyber Security

Cryptus Cyber Security

Cryptus Cyber Security is an Information Security Training company providing advanced training and services to IT Professionals.

SKOUT Secure Intelligence

SKOUT Secure Intelligence

SkOUT Secure Intelligence (formerly Oxford Solutions) provides cyber security monitoring services to organizations around the globe.

Cyber Security Audit Corp (C3SA)

Cyber Security Audit Corp (C3SA)

C3SA specializes in architecting, operating, managing and improving defensible and resilient IT infrastructures for Canada's public and private sectors.

CICRA

CICRA

CICRA is Sri Lanka's pioneering cyber security training and consultancy provider.

Mitre

Mitre

At Mitre we work across government to tackle challenges to the safety, stability, and well-being of our nation. Areas of expertise include Cybersecurity.

SCADASUDO

SCADASUDO

SCADASUDO is a cyber solution architecture and design office, established by leading experts in the field of OT (Industrial control) and IT (information Technology).

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

MetaCert

MetaCert

MetaCert’s Zero Trust browser software reduces the risk of organizations being compromised with a phishing-led cyberattack by more than 98%.

TXOne Networks

TXOne Networks

TXOne Networks offer cybersecurity solutions to protect your industrial control systems to ensure their reliability and safety from cyberattacks.

Cloud4C

Cloud4C

Cloud4C is a leading automation-driven, application focused cloud Managed Services Provider.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

CyberGrape

CyberGrape

CyberGrape is a client centric managed services company, providing enterprise leading security solutions and helping companies through their IT risk and security challenges.