data-security

The Everlasting Cybersecurity Conundrum

Cybersecurity Conundrum

Technologies put forward that attempt to block and ensnare cyber-criminals and the more infamous advances of said cyber-criminals searching for new loopholes and implementing fresh attacks. Unfortunately, just as tech advances such as artificial intelligence aid the security world in the design and development of modern defences, so too is it being used by hackers in automated attacks that are able to more quickly break into user accounts. Overall, cyber-security is a chicken and egg conundrum that’s not likely to change in the foreseeable future.

A Review of 2016

With regards to security breaches and cyber-attacks, said Jonathan Couch, SVP of Strategy at ThreatQuotient, at the end of last year, “Unfortunately right now I think we're still in that area where the bad guys are winning.” According to Trend Micro’s Rundown of the Biggest Cybersecurity Incidents of 2016, ransomware attackers were the most persistent cyber-criminals, while Mirai with the capability of turning devices into DDoS attacking bots took the role of worst all-round troublemaker. In 2016 we unfortunately also saw the first successful cyber-attack on an industrial facility when parts of the Ukrainian power grid were captured causing unscheduled power outages that affected approximately a quarter of a million customers. And with news in December of over a billion users breached and compromised, Yahoo takes the dubious prize for largest breach on record. Along with SWIFT vulnerabilities, the prevalence of ransomware, and further vulnerabilities coming to light, 2016’s cyber-security landscape was troubled, to say the least.

A New Year, a New Strategy?

As much as we’d like to believe that all these holes have been plugged, 2016’s cybersecurity failures imply more to follow in 2017. Experts believe IoT will continue to be vulnerable to attack this year, but with the landscape broadening across personal, business, and governmental areas, as well as innovations and adoptions steadily expanding, the potential for attacks cresting even the recent DDoS attack on Dyn can be envisaged. Malware is also being predicted to be an active threat this year, and with artificial intelligence imbuing such methods with greater ability as well as the industrialisation of cybercrime, it’s a race to see whether security providers and experts can plug holes as quickly as they appear.

Gladly, security automation and orchestration could provide greater defence against cybercrime through machine learning, behavioural analytics, and threat intelligence, but while bolstering the security field and filling skill gaps, such innovations can also be exploited for immoral assistance's; just as autonomous security programs seek out and patch vulnerabilities, so too can autonomous hacking programs seek vulnerabilities, but with a very different end goal in mind. Ransomware is also likely to evolve in 2017, and being one of the ‘better paid’ forms of cybercrime, organizations will have to review strategies to safeguard their systems and data. Regrettably, some experts predict ransomware attacks may develop from primarily finance-driven models to efforts to influence business decisions and policies, affecting strategic outcomes.

A daunting setting, but it’s important not to forget the good guys tirelessly battling these challenges, racing against the clock to prevent intrusions, disruptions and violations; the news seldom highlights failed assaults and successful threat prevention, but they are growing as significantly as the misdeeds. Going forward, organisations and individuals will have to make the commitment to get more involved in cybersecurity; it’s no longer enough to trust providers with this eternal task. Regulators are already coming to the fore helping consumers and providers alike implement necessary security strategies, and the practical among us track current trends while implementing policies that limit vulnerability. It’s time to pick a side, and those reluctant to join the fight against cybercrime are directly enhancing the position and tools of cyber-criminals.

By Jennifer Klostermann

Jennifer Klostermann

Jennifer Klostermann is an experienced writer with a Bachelor of Arts degree majoring in writing and performance arts. She has studied further in both the design and mechanical engineering fields, and worked in a variety of areas including market research, business and IT management, and engineering. An avid technophile, Jen is intrigued by all the latest innovations and trending advances, and is happiest immersed in technology.

CONTRIBUTORS

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in ...
Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...
4 Open Source Business Intelligence Tools For Big Data Reporting

4 Open Source Business Intelligence Tools For Big Data Reporting

Open Source Business Intelligence Tools It’s impossible to take the right business decisions without having insightful information to back up ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
What’s Next In Cloud And Data Security For 2017?

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had ...
Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and ...
What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...

NEWS

U.S. IT Sector Employment Expands by 8,100 Jobs in November, CompTIA Analysis Reveals

U.S. IT Sector Employment Expands by 8,100 Jobs in November, CompTIA Analysis Reveals

DOWNERS GROVE, Ill., Dec. 8, 2017 /PRNewswire-USNewswire/ -- New hiring in computer and electronics manufacturing and technology services and custom ...
Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

Deloitte TMT Predictions: Machine Learning Deployments, On-Demand Content and Live Events Will Continue to Drive Growth

NEW YORK, Dec. 12, 2017 /PRNewswire/ -- Deloitte forecasts double digital growth in machine learning deployments for the enterprise, an increasing worldwide ...
The Department of Defense Cloud

Internet Association asks for U.S. net neutrality vote delay

WASHINGTON (Reuters) - The Internet Association, whose more than 40 members include companies like Google and Amazon, urged the Federal ...