A glimpse into the future of cyber security – the threats, solutions and ideas that will shape the coming year.
Prepare to be exploited. While 2015 has dubbed “the year of the breach”, as cybercriminals increase the number of profitable cyber extortion attacks, 2016 is shaping up to become “the year of ransomware”. Ransomware has proven to be an exceptionally lucrative business, as the locked-out users are often desperate enough to pay exorbitant ransom amounts in order to free their devices and data.
Mobileware – “Are You There?”
From popup to spyware, malicious mobile apps have been around since the launch of app marketers. The rise in malicious apps however, will be due to a combination of easy DIY tutorial and cheap entry to market. Anybody can make an app these days, with hundreds of YouTube videos and online training courses just teaching that. Launching an app has also become more affordable. You can now become an “official” iOS developed and submit your apps to Apple’s App Store from just US$99 a year.
IoT – Rise of the Drones?
There’s no stopping progress, and while you don’t need to fear your WI-FI enabled fridge, anything that can lock, monitor or has access to your private details can pose a threat. IoT hacks are the latest YouTube fad, with everything from baby monitors, to kitchen kettles being cracked by curios, tinkerers. Unfortunately, such skills are easily learnt and are often transferable to more sophisticated and critical devices such as UAVs and cars.
Cloud Data – What Goes Up…
Whether you love it, or are still confused by it, cloud is a great tool for increasing collaboration and having access to your data on the go. The industry is expected to grow by at least 18.4% next year, and with some cloud companies being valued at more than $160 billion, it’s no wonder hackers what a piece of the pie. The problem with cloud is that the policies haven’t caught up with the growth. The incredible amount of data floating around is often protected by minimal or faulty SSL encryption; add to that the issue of international server locations and legislation and you should begin to question the safety of your data.
Hacktivism – The Age of “Digilantes”
It seems Robin Hood has given up the bow and arrow and taken digital form. From groups such as Anonymous to whistle-blowers leaking confidential files, people do and will continue to take “justice” into their own hands. The growing level of DDoS attack on mega corporations and governments, and outright threats to human rights violators will continue to grow in 2016.
(As Product Marketing Manager, Adam drives product-focused communications for WestendITStore. He is actively involved in product strategy and specializes in articulating technical concepts in the form of creative, value-based messages. Adam brings 10 years of experience in marketing enterprise software/hardware products in startup, high-growth and mature companies.)