Experts Make 2016 Cybersecurity Predictions

In 2015, more than 178 million records on Americans were exposed in cyberattacks, according to the Identity Theft Research Center. The worst of them included the breach of the Office of Personnel Management, which exposed the personal information of 21.5 million people.

Even kids weren't safe. When electronic toymaker VTech was hacked in early December, 6.4 million children's profiles were compromised. Many experts don't believe 2016 will be any better. So what should the public be worried about in the coming year?

Everything from smart fridges to connected Barbies to the Apple Watch found their way into American homes in 2015. That trend should continue in 2016 — something hackers will probably exploit, according to several experts.

"A new frontier of data breach issues is on the horizon," Lane Thames, a security researcher for Tripwire, told NBC News. "It is a result of the growing number of devices that belong to the Internet of Things, a.k.a. the IoT."

While the emergence of new smart products might be exciting, Thames said, "very few of these devices are designed and developed with cybersecurity and data privacy in mind. Often, a skilled hacker can break into a new IoT device within a matter of days, if not hours."

Someone hacking into a car or home appliance is scary enough. But the Internet of Things is becoming a vital part of U.S. hospitals, a problem because the healthcare industry already faces 340 percent more cyberattacks than the average industry, according to a report from Raytheon and Websense Security Labs.

Fear of "false positives and delays" for patients means that 75 percent of hospital network traffic goes unmonitored, the report said, putting connected devices with access to sensitive patient information at risk.

Security firm Trend Micro dubbed 2016 the "year of online extortion." Ransomware infects a computer, and then threatens to lock a user out forever or delete data if the user doesn't pay up.

There will be more of that, Trend Micro said in a recent report. But in the wake of the Ashley Madison hack, where members were outed as possible philanderers, the blackmail could be even worse.

"Cyber extortionists will devise new ways to target its victim's psyche to make each attack personal," predicted Trend Micro.

"Reputation is everything, and threats that can ruin an individual's or a business' reputation will prove to be effective and — more importantly — lucrative."

Even more terrifying, the threat of ransomware and the growing Internet of Things could converge, according to Kaspersky Lab, "begging the question, how much would you be willing to pay to regain access to your TV programming? Your fridge? Your car?"

Greed isn't the only thing motivating hackers. In 2015, Anonymous went after ISIS and the Ku Klux Klan.

"Organizations need to realize that financial gain is no longer the only or even the biggest driver of some of their adversaries," Amit Yoran, president of security firm RSA, told NBC News in an email.

While Anonymous might grab the headlines, lone hackers with muddled motivations will be the bigger threat in 2016, predicted McAfee Labs in a recently published report. The people who hacked Ashley Madison and VTech both claimed they were simply exposing poor security practices. Over the next year, McAfee Labs says to expect "attacks that appear to be inspired by hacktivism but actually have very different, hard-to-determine motives."

Hackers don't need advanced skills or lots of money to cause chaos these days, the McAfee Labs report said, calling modern hacktivism "nothing more than a case of copy and paste." That means any kid with an ax to grind and moderate computer skills could take up the mantle of "hacktivism" and cause the next big security breach.

There is no shortage of private security firms and experts promising to prevent cyberattacks. But 2016 could be the year Uncle Sam takes a stand against hackers — for better or for worse.

"As international cyber threats increase and cyber warfare tactics are increasingly used by America's high profile enemies, ISIS, North Korea, Iran, the pressure to do something at the federal level will provide politicians an attractive issue in an election year," Jeff Hill, channel marketing manager for STEALTHbits Technologies, told NBC News.

Expect new legislation meant to protect sensitive information, Hill said, as well as the possibility that President Barack Obama could appoint something like a "cyber security czar to coordinate efforts to combat national security and corporate espionage-driven attacks."

Not only will the government feel pressure to prevent attacks, it will also need to find ways to help the millions of victims of security breaches — some of whom never learn that their information was exposed.

"With breaches on the rise at all levels from government to the private sector we will see a push for more legislation dealing with reporting and protections," Lamar Bailey, research director for Tripwire's vulnerability and exposures research team, told NBC News.

After as many as 80 million records were compromised in the Anthem breach, the insurer offered free credit monitoring to catch fraud. That isn't enough, Bailey said.

"Credit monitoring is not sufficient for protecting victims of a breach — it is like putting a Band-Aid on a bullet wound," Bailey told NBC News, predicting that the government could require more from hacked companies in 2016.

In the past, many assumed that Apple products were safer from cyberattacks than Windows and Android products. But as Apple's popularity grows — it currently owns 13.5 percent and 7.5 percent of the smartphone and PC markets, respectively, according to market research firm IDC — so too could the company's visibility as a target.

"A rising number of threat actors have begun developing specific malware designed to infect devices running Mac OS X or iOS," wrote Symantec on its website, noting that "Apple-related malware infections" have spiked in the last 18 months.

"Should Apple's popularity continue to grow, it seems likely that these trends will continue in 2016," said Symantec. "Apple users should not be complacent about security and change their perception that Apple devices are 'free from malware.'"
As always, there are steps that people can take to protect themselves, from always updating their software to coming up with a nearly unbreakable password (don't worry, there is an 11-year-old girl who can help you with that).

In 2016, IDC expects that more than 3.2 billion people will have access to the Internet. That is a lot of potential hackers and targets, so don't expect the number of security breaches to come down anytime soon.

NBC: http://nbcnews.to/1Ss9VKD

 

« Cyberwar Represents An Existential Threat
Predictive Analytics Tools Confront Insider Threats »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

CounterCraft

CounterCraft

The CounterCraft Cyber Deception Platform fits seamlessly into existing security strategies and delivers high-end deception for threat hunting and threat detection.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

Standards Council of Canada (SCC)

Standards Council of Canada (SCC)

SCC leads and facilitates the development and use of national and international standards and accreditation services in Canada.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

Project Moore

Project Moore

Project Moore is an Amsterdam law firm specialising in IT-law and privacy.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

Dhound

Dhound

Dhound is a cybersecurity company providing web application penetration testing.

HENSOLDT Cyber

HENSOLDT Cyber

HENSOLDT Cyber introduces a paradigm shift to cyber security. Our products have been designed to ensure the integrity of embedded systems at the core: the operating system and the processor.

Citizen Lab - University of Toronto

Citizen Lab - University of Toronto

Citizen Lab focuses on research and development at the intersection of cyberspace, global security & human rights.

Agile Defense

Agile Defense

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government.

Buguard

Buguard

Buguard is a multi-award-winning supplier of Application Security Assessments and GRC services.

Dryad Global

Dryad Global

Dryad Global offers a comprehensive suite of maritime intelligence solutions, including a best-in-class situational awareness, planning and security system and industry-leading cyber protection tools.

Synersoft BLACKbox

Synersoft BLACKbox

Synersoft, the maker of path-breaking and disruptive technology for SMEs, now branded as BLACKbox, is an incubated and invested portfolio company of CIIE - IIM-Ahmedabad.

Uninets

Uninets

UniNets mission is to provide IT professionals with high-quality, accessible, and relevant e-learning courses that enable them to stay ahead of the curve in their industry.

Parrot Security (ParrotSec)

Parrot Security (ParrotSec)

Parrot Security provides a huge arsenal of tools, utilities and libraries that IT and security professionals can use to test and assess the security of their assets.