CALL US

+91 8219776763

There are 7 cyber security trends for 2017 | Cyberops

There are 7 cyber security trends for 2017

By Prempal Singh 0 Comment April 1, 2017

Do you think 2016 was obviously an untruth when it came to cyber security and hide threats? All of us may be just getting warmed up.

From BEC attacks to shadow IT, the following are seven cyber security trends and potential solutions experts predict will take the spotlight in 2017.

1. Responsibility for device security:

Responsibility for the security of technology devices came into the spotlight late previous year after it was revealed that 1000s of low-security Internet of things devices were used to launch large-scale DDoS problems, impacting DNS provider Dyn as well as several other organizations.

In response, the FTC started out focusing on IoT device manufacturers in whose devices lack satisfactory security.

In January, the FTC filed a complaint against D-Link Corporation and the U. S. subsidiary, claiming that “D-Link failed to take reasonable procedure for secure its routers and Internet Protocol (IP) digital cameras, potentially compromising sensitive consumer information, including live online video and audio tracks feeds from D-Link IP cameras, inch according to an FTC announcement. The FTC also recently brought cases against other IoT device manufacturers ASUS and TRENDnet.

Obviously, now more than at any time, IoT device makers and other tech suppliers must ensure they are taking satisfactory security precautions or face potential legal repercussion.

2. installment payments on your Business Email Compromise (BEC) schemes:

Exploits driven by stolen or invented details, also known as BEC attacks, grew in style and effectiveness in 2016. BEC attacks compromised businesses in every market previous year, including leading health care organizations, an NBA team, financial institutions, the world Anti-Doping Association, John Podesta and the Democratic Country wide Committee, according to BrandProtect.

“For a medium-sized investment of social engineering and email and web facilities creation, fraudsters put themselves in position for huge gains, ” said Mancusi-Ungaro. “Ironically, whenever an effective BEC attack is reported, the news accounts often include a blueprint for how the attack worked — essentially a primer for other fraudsters. Essentially, every successful BEC attack spawns other BEC attacks inch.

3. Mobile device security:

The ubiquity of mobile phones makes them a nice-looking target for hackers. Since mobile phones operate outdoors of the product range of a virtual corporate network and are fully handled by employees, they are a lot more difficult to protect than computers used within a traditional office.

At the same time, the growing use of mobile phones is creating demand in the mobile threat security market. Mobile threat security companies provide employees a security software to set up on their mobile phone, which, according to Gartner, can do something like check out for dangerous software or risky WiFi networks while the staff is on the go.

Inside the enterprise, the issue of how to cover mobile defense solutions can be a sticking point. IT departments are generally not given extra resources for mobile device management, but that could soon change. As hackers become more good at ignoring into mobile devices, companies are researching to better protect themselves, and it is likely mobile device management funding will become more commonplace this year.

The real question that should be asked in 2017 related to mobile security is, how can companies ensure information is safeguarded no matter where it is, or on what device it is utilized?

“The answer to that goes returning to access management, having the right plans in place, making sure your business has the right solutions in the destination to tackle security business problems and minimize emerging risks, “said Black.

4. Contextual usage of safeguard digital assets:

New technologies concentrating on a contextual usage of hook up to online databases and other authoritative sources are poised to develop 2017, according to Ethan Ayar, CEO of Resilient Network Systems. Such technologies answer complex questions so organizations can be more comfortable that they are approving access to the right functions.

“Many organizations today use traditional Identity and Gain access to Management systems to obtain resources by attempting to create the identity of someone requesting access, ” said Ayer. “But, as we all know too well, identity by itself in the online world is no longer sufficient inch.

“New technologies that give attention to contextual access can hook up to online databases and other authoritative sources to answer complex questions like ‘Is your husband a doctor? ‘ or ‘Is this a trusted device? These additional attributes enhance identity so that organizations can be more comfortable that they are approving access to the right parties inch.

5. Cloud storage services and darkness IT putting businesses at risk:

The average volume of cloud services in use per enterprise rose to 1,031 in the last quarter of 2016, up from 977 the prior quarter, and darkness IT still presents a huge problem.

Even for popular software like Container, Dropbox or Google Travel that IT has officially sanctioned, practically 50 % of users are interacting with them from non-corporate email accounts and unintentionally revealing sensitive data to exterior risks.

6. Authentication and DMARC:

Phishing attacks centered on impersonating a brand are spiking. These problems get through traditional defense since there’s no spyware and adware or bad links in the e-mail to filtration. DMARC, a standard that email companies are increasingly implementing to protect email users from phish, shuts same-domain impersonation attacks.

DMARC also has a reporting profit. Any emails that get rejected generate a record that’s sent back to the domain owner. This kind of gives IT an opportunity to see if phishing attacks are underway. It also provides IT an opportunity to identify “shadow” services that employees are using without IT’s knowledge.

7. Device-specific qualifications:

When you crypto-logically ‘bind’ a user account to a physical device, security, convenience, and privacy are well-balanced.

With device-specific credentials, once you crypto-logically ‘bind’ a user account to an actual device, the world is your oyster in conditions of balancing security, convenience, and privacy.

“To the average person, this implies your phone becomes your password, and this will be a huge improvement to existing credentials, ” said Ayer.

While some system is required, having the capacity to ask the device, and hence the consumer, to enter a pin, use a biometric or maybe ‘be human’ is a great extra factor.

Source: www.ciodive.com

error: Content is protected by Cyberops !!