What Are The Big Cyber Threats In 2017?

As the end of 2016 approaches, we enter the period when security vendors publish their predictions for what cyber threats may emerge in 2017. Whilst 2016 will be remembered as the year of the data breach, several obvious threats are likely to feature in the next 12 months:

Mobile -Whilst a predicted rise in attacks against mobile devices has been repeatedly predicted for a number of years, many experts believe that 2017 really will be the year of significant attacks against mobile devices. As this threat continues to grow and businesses increasingly utilise Bring Your Own Devices in the workplace, corporate breaches that originate on mobile devices will become a more significant corporate security concern.

Internet of Things (IoT) -The threat from IoT devices has been starkly highlighted in the past few weeks with the creation and exploitation of IoT botnets used in record breaking DDoS attacks. 

A botnet variant called Mirai was identified by security firms as being the tool used to find and compromise insecure IoT devices. The ability to bring down some of the world’s biggest websites and more recently an entire nation’s (Liberia) internet connection suggests that DDOS attacks using IoT botnets are likely to grow even larger in scale.

As more IoT devices are connected in 2017, the threat surface will increase accordingly.

Cloud -An attack to disrupt or take down a major cloud provider has the potential to affect a number of customers’ businesses. As more organizations start to utilise cloud services, these attacks are likely to start finding their way into this new infrastructure, either by encrypted files spreading cloud to cloud or by malicious actors using the cloud as a volume multiplier.

Ransomware -In 2016 the threat from Ransomware rose dramatically with more advanced variants bringing in millions of Dollars of ransom money to cybercriminals. Ransomware is highly effective and is now the most profitable malware type in history. New variants of the malware are likely to aim for higher value targets next year such as company databases. By hitting an organisation where it hurts the attackers will be able to demand more ransom money.

Can you counter these threats?

No-one can 100% guarantee that you won’t fall victim to these threats, but you can reduce them dramatically by implementing relatively simple measures such as ensuring you have a plan in case disaster strikes and ensure that you regularly backup your most important data.

Education

According to the UK government, developing a cyber aware culture through training can reduce the cyber threat by as much as 80%.

With New EU (GDPR) legislation is due to come into force in May 2018 that will severely punish organisations that do not adequately protect their customer’s data it would be a good idea to get your organisation as secure as possible.

You can greatly reduce the cyber threat through education. Course such as our Cyber Security Fundamentals and Cyber Executive Awareness courses teach execs and employees the basics of cyber security. They give an overview of the cyber threat landscape, threats and the associated risks with cyber and the impact a breach can have on both businesses and individuals.

PGI Cyber:     2016 Trends in Cyber Crime:
 

 

« AI Beating Humans? Not In My lifetime, Says Google Chief
Half The World's Population Is Not Yet On The Internet. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

OCERT

OCERT

OCERT is the National Computer Emergency Response Team of Oman.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

Uniwan

Uniwan

Uniwan is an IT services company specializing in networking and security.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

Highland Capital Partners

Highland Capital Partners

Highland Capital Partners is an early stage venture capital firm focused on category-defining businesses in consumer and enterprise technology, including cybersecurity.

GCHQ Apprenticeships

GCHQ Apprenticeships

GCHQ, the UK intelligence and security organisation, offers a unique three-year Cyber Security Degree Apprenticeship with employment on successful completion.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Canopius Group

Canopius Group

Canopius is a global specialty lines insurance and reinsurance company and one of the top 10 insurers in the Lloyd’s insurance market.

Cyber Griffin

Cyber Griffin

Founded by the City of London Police in 2017, Cyber Griffin is an initiative that supports businesses and individuals in the Square Mile to protect themselves from cyber crime.

Hyperproof

Hyperproof

Hyperproof is a cloud-based compliance operations software. Launch new programs immediately, collect evidence automatically, and manage a compliance program intelligently.

Board of Cyber

Board of Cyber

Board of Cyber offers Security Rating: a fast, non-intrusive, continuous, 100% automated solution to evaluate the cyber performance of an organization.

Colt Technology Services

Colt Technology Services

Colt Technology Services (Colt) is a global digital infrastructure company which creates extraordinary connections to help businesses succeed.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

Blackwell Security

Blackwell Security

Blackwell is a driving force in healthcare cybersecurity, transforming how security operations are conducted within this critical sector.

Silicon Valley Cybersecurity Institute (SVCSI)

Silicon Valley Cybersecurity Institute (SVCSI)

SVCSI aims to investigate, develop, and promote technical excellence and the best security practices for dependable and secure systems and applications.