What Are The Big Cyber Threats In 2017?

As the end of 2016 approaches, we enter the period when security vendors publish their predictions for what cyber threats may emerge in 2017. Whilst 2016 will be remembered as the year of the data breach, several obvious threats are likely to feature in the next 12 months:

Mobile -Whilst a predicted rise in attacks against mobile devices has been repeatedly predicted for a number of years, many experts believe that 2017 really will be the year of significant attacks against mobile devices. As this threat continues to grow and businesses increasingly utilise Bring Your Own Devices in the workplace, corporate breaches that originate on mobile devices will become a more significant corporate security concern.

Internet of Things (IoT) -The threat from IoT devices has been starkly highlighted in the past few weeks with the creation and exploitation of IoT botnets used in record breaking DDoS attacks. 

A botnet variant called Mirai was identified by security firms as being the tool used to find and compromise insecure IoT devices. The ability to bring down some of the world’s biggest websites and more recently an entire nation’s (Liberia) internet connection suggests that DDOS attacks using IoT botnets are likely to grow even larger in scale.

As more IoT devices are connected in 2017, the threat surface will increase accordingly.

Cloud -An attack to disrupt or take down a major cloud provider has the potential to affect a number of customers’ businesses. As more organizations start to utilise cloud services, these attacks are likely to start finding their way into this new infrastructure, either by encrypted files spreading cloud to cloud or by malicious actors using the cloud as a volume multiplier.

Ransomware -In 2016 the threat from Ransomware rose dramatically with more advanced variants bringing in millions of Dollars of ransom money to cybercriminals. Ransomware is highly effective and is now the most profitable malware type in history. New variants of the malware are likely to aim for higher value targets next year such as company databases. By hitting an organisation where it hurts the attackers will be able to demand more ransom money.

Can you counter these threats?

No-one can 100% guarantee that you won’t fall victim to these threats, but you can reduce them dramatically by implementing relatively simple measures such as ensuring you have a plan in case disaster strikes and ensure that you regularly backup your most important data.

Education

According to the UK government, developing a cyber aware culture through training can reduce the cyber threat by as much as 80%.

With New EU (GDPR) legislation is due to come into force in May 2018 that will severely punish organisations that do not adequately protect their customer’s data it would be a good idea to get your organisation as secure as possible.

You can greatly reduce the cyber threat through education. Course such as our Cyber Security Fundamentals and Cyber Executive Awareness courses teach execs and employees the basics of cyber security. They give an overview of the cyber threat landscape, threats and the associated risks with cyber and the impact a breach can have on both businesses and individuals.

PGI Cyber:     2016 Trends in Cyber Crime:
 

 

« AI Beating Humans? Not In My lifetime, Says Google Chief
Half The World's Population Is Not Yet On The Internet. »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Guidewire

Guidewire

Guidewire Cyence™ Risk Analytics is a cloud-native economic cyber risk modeling solution built to help the insurance industry quantify cyber risk exposures.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

Bunifu Technologies

Bunifu Technologies

Bunifu Technologies is an Information Security and Custom Software Development Company.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

Deceptive Bytes

Deceptive Bytes

Deceptive Bytes provides an Active Endpoint Deception platform that dynamically responds to attacks as they evolve and changes their outcome.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Inspectiv

Inspectiv

Inspectiv offers a turn-key solution to continuously identify security vulnerabilities and provide security assurance.

Wib

Wib

Wib is an API security leader. We are the only company providing a solution for the entire API development lifecycle.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

Cyber and Fraud Centre – Scotland

Cyber and Fraud Centre – Scotland

The Cyber and Fraud Centre – Scotland exists to ensure Scottish organisations are as resilient as they can be against cyber and fraud crime.

Iron EagleX

Iron EagleX

Iron EagleX deliver engineering solutions in cloud computing, big data, cyber, and machine learning technologies to US Government customers.

Xantaro

Xantaro

Xantaro specializes in technologies, software and services for Carriers, ISPs, Hosting and Cloud Providers as well as for Operators of Data Centres and Campus Networks.