Leaving Hacks Behind - Cybersecurity Predictions for 2018

While each of the last several years has been dubbed “the year of the hack,” 2017 may actually deserve that infamous title. Major breaches at large organisations like Equifax, Deloitte and Verizon have all taken place in the last year.

In fact, Identity Force reports that 43 of the worst data breaches of all time happened in 2017. We can only hope that this year will feel a bit more secure in our digital world, or at the very least avoid even more impressive catastrophes.

With the growth of security and technology today, we should be seeing fewer cyberattacks, not more. To avoid becoming this year’s disheartening statistic, organisations need to be more proactive about identifying and preventing cyber threats and heed the following predictions:

More (IoT) Data, More Leaks

As the use of IoT devices increases both by consumers and across industries, people and organizations are benefitting from the additional features and increased data gathered from these connected devices. The market is growing by leaps and bounds, yet a number of IoT interfaces do not have robust security.

Botnets like Reaper and Mirai may just be the beginning, and we expect to see an increased number of data breaches in IoT devices this year.

With this in mind, organisations should conduct thorough research before purchasing new IoT technologies. If a device has a hidden administrative account with a hard-coded password, or runs an older framework with known vulnerabilities, it may be impossible to correct.

When purchasing such devices, make sure you can upgrade the firmware, or consider devices that automatically update their own firmware. Review your environment on a quarterly basis and keep these devices up-to-date to avoid possible security issues. If a device in your environment is fundamentally flawed, you may need to turn it off to mitigate a serious risk.

Regulation will prompt action

Regulations such as NIST 800-171 and the upcoming GDPR will prompt companies to examine their overall security strategy and mitigate risks to their private information. Some companies will do this, some will not.

Data privacy is more important than ever and ensuring that companies abide by these standards will ultimately strengthen a companies’ business. Many US organisations will use a standard such as GDPR to incentivise putting a holistic plan in place.

While undergoing the compliance process, it’s important for organisations to ensure they are enforcing authorisation into systems and networks, while protecting content behind firewalls, and having a plan of action for how to respond in the event of a potential breach. These three areas are key: authorisation, protection, and response.

Business as usual

Despite the growth of data breaches impacting major companies in 2017, a number of organisations still do not take security seriously. After all, how many companies go out of business because they mishandle customer data?

We expect to see two or more major breaches in 2018 that impact millions of consumers. To reduce the risk of a breach, organisations should monitor security updates impacting their systems, and teams should hold a monthly review to make sure they are up to date.

In addition, expand beyond simple perimeter security by using rights-management software. This actively protects data stored within and leaving the network to add another level of security.

A good rights-management solution protects content in transit, at rest, and while in-use. Employing a data-loss protection (DLP) or a cloud access security broker (CASB) to actively monitor network traffic can also add a layer of protection for information leaving your internal network.

Cybersecurity Culture

In 2018, more companies will adopt “security-first” thinking and begin to develop a more robust cybersecurity culture. A company is much like a castle, and security is the strength of the moat surrounding a castle, protecting the king, queen, and other residents from invaders.

Except in this case, instead of people you have Personal Identifiable Information (PII), proprietary files, intellectual capital, medical information, legal documents, and other information that should only be seen and shared with those people and organisations who have received authorisation.

Adopting security-first thinking means strengthening the moat as the primary line of defense for the castle and its inhabitants.

For organisations to adopt such a culture, people need to be educated on the importance of security with regular awareness campaigns, which includes training procedures such as simulated security attacks with phishing and other attack vectors.

Additionally, companies need to enforce improved record keeping policies to manage and encrypt key organisational data.

Information- Management:

You Might Also Read: 

The Top 5 Tech Trends For 2018:

Offensive Security, Cyber Insurance & Cryptocurrencies: 2018 Predictions:

 

 

« Cybercrime: £130bn Stolen From Consumers In 2017
Ethical Hacking Is A Great Career Option »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Cyber Security Expo

Cyber Security Expo

Cyber Security EXPO is a unique one day recruitment event for the cyber security industry.

IBA Security

IBA Security

IBA Security is a center of competence consolidating the cybersecurity expertise of the IBA Group.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

LibraSoft

LibraSoft

Librasoft creates solutions to protect information from external and internal threats.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

Quantexa

Quantexa

Quantexa automates millions of operational decisions, at scale, across multiple business units, including Anti-Money Laundering, Know-Your-Customer, Fraud, Credit Risk and Customer Intelligence.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

Sixteenth Air Force (Air Forces Cyber)

Sixteenth Air Force (Air Forces Cyber)

Air Forces Cyber provides mission integration of Information Warfare at operational and tactical levels, creating dilemmas for adversaries in competition and, if necessary, future conflicts.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

PCI Security Standards Council (PCI SSC)

PCI Security Standards Council (PCI SSC)

The PCI Security Standards Council is a global forum that brings together payments industry stakeholders to develop and drive adoption of data security standards and resources for safe payments.

Adaptiva

Adaptiva

Adaptiva, the autonomous endpoint management company, delivers the fastest way to patch and manage endpoints at scale.

ITConnexion

ITConnexion

ITConnexion is an Australian-based Managed IT Service with over 20 years of experience. We offer a complete IT management service for non-profits, SMEs, and enterprises.