Six Cyber Predictions For 2017

Cybersecurity has moved beyond patching, to focus on big picture problems such securing cloud services, the disappearing perimeter and the managing the flood of mobile devices.  

McAfee Labs 2017 Threats Predictions report gives government IT managers a heads up on what to expect next year:

1. Ransomware subsides in the second half of 2017

The scourge of hospitals, government agencies, transit organisations and others, ransomware may be leveling off, with the widespread media attention expected to spur solutions. Special interest organisations have done a good job of raising awareness, and companies have taken up the call to find answers.

2. “Drone-jacking” places threats in the sky

Consumer drones sold with open ports and weak authentication create opportunities for attackers to take control of unmanned systems.

Although vulnerabilities can often be fixed with a software update, “this requires the manufacturer to release a patch,” the report said.

Expensive, high-end drones will get patched quickly, but hobbyist drones may fly a long time before a patch is even available. That means exploit kits for unsecured drones will become available, and drone-jacking via laptops with directional antennas may emerge.

Unsecured drones open up risks for package delivery, aerial photography and law enforcement surveillance. Besides the danger to the devices themselves, look for drones that land on buildings and attempt to hack into the wireless networks inside.

3. Takedown operations put a dent in cyber-crime

Increased cooperation among law enforcement, industry and security vendors will help shut down criminal operations. The report warns, however, that cyber-criminals will begin to challenge the relationship between private vendors and law enforcement agencies, so all parties should prepare for legal ramifications of cooperation.

4. Threat intelligence sharing improves

New automated tools will make sharing information easier, and crowd-sourced threat intelligence and collaborative analytics help security analysts “connect the dots.” Legislation like the Cybersecurity Information Sharing Act will help overcome barriers to sharing by extending liability protection to the sharing entities.  

5. Cyber-espionage increases in complexity

Former state-sponsored teams will become information brokers in cyber-espionage in 2017, providing “access” for money. “Everyone has information that is worth something, but it takes a creative mind to profit from it,” McAfee says. Additionally, advanced attackers are accessing networks by attacking firewalls, giving them “a great way to fly below the security radar.”

6. Cyber and physical systems merge

The separation between the physical and digital world could begin its erosion in 2017, making the security of one dependent on the security of the other. McAfee predicts that the physical and cybersecurity industries will begin hardening security products and that cybersecurity solution providers will begin to service and support physical security.

GCN:                What Are The Big Cyber Threats In 2017?:

 

 

« Self - Flying Aircraft Take To British Skies
British Police - Stay Safe From Cyber Crime This Christmas »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Linklaters LLP

Linklaters LLP

Linklaters is an international law firm. Practice areas include Information Management and Data Protection.

Seclore

Seclore

Seclore is the most advanced, secure, and automated Enterprise Digital Rights Management (EDRM) solution available.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

NSEIT

NSEIT

NSEIT offers end-to-end Information Technology products, solutions and services including cybersecurity to organizations in the financial sector.

Cycuity

Cycuity

Cycuity (formerly Tortuga Logic) is a cybersecurity company that is transforming the way we secure silicon with comprehensive hardware security assurance.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Aryaka

Aryaka

Aryaka’s SmartServices offer connectivity, application acceleration, security, cloud networking and insights leveraging global orchestration and provisioning.

GuardYoo

GuardYoo

GuardYoo's SaaS platform allows cybersecurity professionals to perform Compromise Assessment remotely from anywhere in the world.

Security BSides Cayman Islands

Security BSides Cayman Islands

Security BSides is a non-profit, community-driven event built for and by information security community members. Our aim is to help build an Information Security community in the Cayman Islands.

Approov

Approov

Approov provides a comprehensive runtime security solution for mobile apps and their APIs, unified across iOS and Android.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.

Codezero Technologies

Codezero Technologies

Codezero is at the forefront of microservices development, employing an identity-aware overlay network that delivers zero-trust security to DevOps.

Fortress SRM

Fortress SRM

Fortress SRM protects companies from the financial, operational, and emotional trauma of cybercrime by improving the security performance of its people, processes, and technology.