10 Security Trends to Look for in 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Next

Internet of Things

Internet of Things challenges will continue.

The Internet of Things (IoT) introduces new network devices into your environment, all with their own vulnerabilities, said Wolfgang Kandek, CTO at Qualys. The best way to limit their reach into your corporate network is to have a guest network where end users can install these devices and where no access to enterprise devices is available. Kandek recommended using features such as AP isolation to make sure that devices are sheltered from each other's network. Speaking of IoT, a positive security note that Kandek thinks we'll soon see is overall automatic patching in IoT devices, similar to what we've been seeing with smartphones.

2014 was known as The Year of the Breach. It could be that 2015 will be known as The Year of the Really Big Breaches. Or perhaps it will be remembered as the year that mobile malware really began to make a statement or cyberespionage entered the American lexicon. If nothing else, the year that is ending was the one when everyone, from executives to the average citizen, became aware of how much damage a cyberattack can cause.

So what is on the horizon for 2016? Most experts expect to see continued growth in mobile malware and even more security breaches, especially in the health care and financial industries. The PIN and chip EMV standard is still too new and not well-enough implemented for anyone to have a good feel on what effect it will have on credit card security. We'll always have new strains of malware and innovative phishing attacks. Those are the easy predictions.

Here are 10 security trends that the experts think we should keep an eye on in 2016.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.