Rakesh Baloda Rakesh Baloda Author
Title: A New Dimension to Cyber Security in 2016
Author: Rakesh Baloda
Rating 5 of 5 Des:
2015 has been a year where we have seen so many of big breaches, that everyone is well aware the damage caused by cyber-attacks. So you mi...
2015 has been a year where we have seen so many of big breaches, that everyone is well aware the damage caused by cyber-attacks. So you might be wondering what’s in store for 2016? Well, with the continuation of growth in mobile malware, the breaches have been increasing and specifically in domains such as financial institutions and health care. To top it up there will always be new malwares and innovative phishing attacks. As organizations are opting for new security mechanisms at the same time cyber criminals are becoming sophisticated and innovative to perform attacks. Organizations should learn to prepare for the unknown consequences so that they can have the flexibility to withstand unexpected, high impact security events. Thus, the below cyber security trends must be considered to combat threats in 2016.
Intelligence-led Security
The market is flooding with Intelligence based products, such as the ones tracking security based incidents and behaviors, threat management and log management making it simpler to analyze the huge amount of data generated from across customer’s network.
Real-time monitoring and advanced analytic are widely being adopted as businesses find it convenient to rely on intelligence based reports on which actions can be taken easily.
Mobile ware
Since the launch of apps in market, there is always a threat of malicious mobile apps and spyware. Now days, anyone can make an app using videos and tutorials online. Thus, a research says that by end of 2016 mobile malware will grow to 20 million.
Wearable Tech Risk
As the wearable technology is growing so is the risk related to the security and privacy of the same. Companies have controls in place for the BYOD but wearable and connected devices are not considered part of risk management strategy. As more and more devices are connected and security risks are increasing, it is necessary to monitor the logs generated by these devices. Thus, necessary policies and procedures must be in place as they are enable innovation and personal privacy.
Fallout from Snowden
The relationship between US and Europe is being affected by the Snowden leaks. The Safe Harbour agreement was declined which allowed the Europe and US private companies to share personal data. This will lead to increased security for this private data to keep it out of reach of US intelligence agencies. The Snowden leaks resulted in smaller countries to acquire and sign laws and treaties similar to US and China in order to prevent proliferation to tools and knowledge related to hacking and online espionage.
Also, Snowden leaks reveled that NSA had keys to the backdoor in a random number generator that could break the encryption in 16 seconds. RSA got $10 million from NSA to make it default random generator a part of one of its packages. The documents revealed that NSA tried to influence the encryption standards to make the commercial companies make their products such that they are susceptible to US surveillance.
Attacks on Payment Card Data
Continued attacks on payment card data are seen among business and corporations, also financial frauds are increasing with bank credentials being stolen via various means such as social engineering tricks such as spear phishing emails.

About Author

Advertisement

एक टिप्पणी भेजें

 
Top