Experts Make 2016 Cybersecurity Predictions

In 2015, more than 178 million records on Americans were exposed in cyberattacks, according to the Identity Theft Research Center. The worst of them included the breach of the Office of Personnel Management, which exposed the personal information of 21.5 million people.

Even kids weren't safe. When electronic toymaker VTech was hacked in early December, 6.4 million children's profiles were compromised. Many experts don't believe 2016 will be any better. So what should the public be worried about in the coming year?

Everything from smart fridges to connected Barbies to the Apple Watch found their way into American homes in 2015. That trend should continue in 2016 — something hackers will probably exploit, according to several experts.

"A new frontier of data breach issues is on the horizon," Lane Thames, a security researcher for Tripwire, told NBC News. "It is a result of the growing number of devices that belong to the Internet of Things, a.k.a. the IoT."

While the emergence of new smart products might be exciting, Thames said, "very few of these devices are designed and developed with cybersecurity and data privacy in mind. Often, a skilled hacker can break into a new IoT device within a matter of days, if not hours."

Someone hacking into a car or home appliance is scary enough. But the Internet of Things is becoming a vital part of U.S. hospitals, a problem because the healthcare industry already faces 340 percent more cyberattacks than the average industry, according to a report from Raytheon and Websense Security Labs.

Fear of "false positives and delays" for patients means that 75 percent of hospital network traffic goes unmonitored, the report said, putting connected devices with access to sensitive patient information at risk.

Security firm Trend Micro dubbed 2016 the "year of online extortion." Ransomware infects a computer, and then threatens to lock a user out forever or delete data if the user doesn't pay up.

There will be more of that, Trend Micro said in a recent report. But in the wake of the Ashley Madison hack, where members were outed as possible philanderers, the blackmail could be even worse.

"Cyber extortionists will devise new ways to target its victim's psyche to make each attack personal," predicted Trend Micro.

"Reputation is everything, and threats that can ruin an individual's or a business' reputation will prove to be effective and — more importantly — lucrative."

Even more terrifying, the threat of ransomware and the growing Internet of Things could converge, according to Kaspersky Lab, "begging the question, how much would you be willing to pay to regain access to your TV programming? Your fridge? Your car?"

Greed isn't the only thing motivating hackers. In 2015, Anonymous went after ISIS and the Ku Klux Klan.

"Organizations need to realize that financial gain is no longer the only or even the biggest driver of some of their adversaries," Amit Yoran, president of security firm RSA, told NBC News in an email.

While Anonymous might grab the headlines, lone hackers with muddled motivations will be the bigger threat in 2016, predicted McAfee Labs in a recently published report. The people who hacked Ashley Madison and VTech both claimed they were simply exposing poor security practices. Over the next year, McAfee Labs says to expect "attacks that appear to be inspired by hacktivism but actually have very different, hard-to-determine motives."

Hackers don't need advanced skills or lots of money to cause chaos these days, the McAfee Labs report said, calling modern hacktivism "nothing more than a case of copy and paste." That means any kid with an ax to grind and moderate computer skills could take up the mantle of "hacktivism" and cause the next big security breach.

There is no shortage of private security firms and experts promising to prevent cyberattacks. But 2016 could be the year Uncle Sam takes a stand against hackers — for better or for worse.

"As international cyber threats increase and cyber warfare tactics are increasingly used by America's high profile enemies, ISIS, North Korea, Iran, the pressure to do something at the federal level will provide politicians an attractive issue in an election year," Jeff Hill, channel marketing manager for STEALTHbits Technologies, told NBC News.

Expect new legislation meant to protect sensitive information, Hill said, as well as the possibility that President Barack Obama could appoint something like a "cyber security czar to coordinate efforts to combat national security and corporate espionage-driven attacks."

Not only will the government feel pressure to prevent attacks, it will also need to find ways to help the millions of victims of security breaches — some of whom never learn that their information was exposed.

"With breaches on the rise at all levels from government to the private sector we will see a push for more legislation dealing with reporting and protections," Lamar Bailey, research director for Tripwire's vulnerability and exposures research team, told NBC News.

After as many as 80 million records were compromised in the Anthem breach, the insurer offered free credit monitoring to catch fraud. That isn't enough, Bailey said.

"Credit monitoring is not sufficient for protecting victims of a breach — it is like putting a Band-Aid on a bullet wound," Bailey told NBC News, predicting that the government could require more from hacked companies in 2016.

In the past, many assumed that Apple products were safer from cyberattacks than Windows and Android products. But as Apple's popularity grows — it currently owns 13.5 percent and 7.5 percent of the smartphone and PC markets, respectively, according to market research firm IDC — so too could the company's visibility as a target.

"A rising number of threat actors have begun developing specific malware designed to infect devices running Mac OS X or iOS," wrote Symantec on its website, noting that "Apple-related malware infections" have spiked in the last 18 months.

"Should Apple's popularity continue to grow, it seems likely that these trends will continue in 2016," said Symantec. "Apple users should not be complacent about security and change their perception that Apple devices are 'free from malware.'"
As always, there are steps that people can take to protect themselves, from always updating their software to coming up with a nearly unbreakable password (don't worry, there is an 11-year-old girl who can help you with that).

In 2016, IDC expects that more than 3.2 billion people will have access to the Internet. That is a lot of potential hackers and targets, so don't expect the number of security breaches to come down anytime soon.

NBC: http://nbcnews.to/1Ss9VKD

 

« Cyberwar Represents An Existential Threat
Predictive Analytics Tools Confront Insider Threats »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Chatham House

Chatham House

Chatham House is an independent policy institute based in London. Topics cover foreign affairs and defence including cyber security.

Secure Technology Alliance

Secure Technology Alliance

Secure Technology Alliance is a multi-industry association working to stimulate the adoption and widespread application of secure solutions.

SafeCharge

SafeCharge

SafeCharge is a global provider of technology-based multi-channel payments services and risk management solutions for demanding businesses.

VisionWare

VisionWare

VisionWare provide consulting services and solutions in areas covering both physical and digital security.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Scientific Cyber Security Association (SCSA)

Scientific Cyber Security Association (SCSA)

The main goal of Scientific Cyber Security Association is the development of scientific and practical directions of cyber security.

DOS

DOS

DOS is an Ecuadorian company with 3 decades of presence in the market and extensive experience in the planning, management and execution of IT Service Integration Projects.

Data Protection People

Data Protection People

Data Protection People are specialists in Data Privacy, Governance, and Information Security.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

Information Security Officers Group (ISOG)

Information Security Officers Group (ISOG)

ISOG's mission is to strengthen information security through awareness and education programs, promoting community and fellowship among information security leaders.

DuckDuckGoose

DuckDuckGoose

DuckDuckGoose offer advanced solutions to protect against manipulated videos, images, voices and texts.

Price Forbes

Price Forbes

Building on more than 100 years of specialist insurance broking, Price Forbes partner with clients around the world who are looking to understand and balance today’s risk and plan for the future.