2016 Security Trends: What's Next for Data Breaches?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next 2016 Security Trends: What's Next for Data Breaches?-6 Next

Email Shaming

Email shaming: Increased targeted attacks with defamation as the objective.

Common to the network attacks on Sony and, later, the infamous Hacking Team in Italy, company emails were released to the public to the shame and embarrassment of each business. In the case of Sony, the attackers released emails on public sites, revealing confidential and sensitive information that is still creating waves and ill will. The cyber criminals focused on emails from the top five execs from Sony studios. The postings were brought to the attention of press.

In the case of Hacking Team, over 400GB of company email, passwords, internal documents and source code were leaked through a torrent posted via the company's own Twitter handle. In addition, the attackers used their access to the Hacking Team's Twitter account for over 12 hours, posting screenshots of internal emails and other items.

In the coming year, there will likely be more activities that are intended to shame or damage the organization that suffers a network attack.

Over the past year, there have been a number of disturbing developments with regards to data breaches. Not only have data breaches become more frequent, but their impact has become greater — not just in the sheer volume of information or assets stolen, but in the very nature of what hackers are targeting. The extremely sensitive data lost in the White House and Office of Personnel Management breaches are prime examples. Unfortunately, given the successful breaches of high-value targets in 2015, we can be sure that 2016 will only get worse.

With this horrifying direction and the gravity of what's at stake, it would be a fair expectation that most enterprises should be seriously looking at how their security needs to change. Obviously, traditional security is of little value when it comes to stopping a data breach. Intruders can easily elude preventative security — generally by compromising a single user device or account — and furtively conduct their business inside a network for months before being discovered.

A big part of the problem is that security organizations are still focused on preventative security — looking for a silver bullet that will keep an attacker out of their networks in the first place. Despite a Gartner recommendation that organizations shift security efforts toward the detection of network intruders and the emergence of promising new behavioral analytic tools and security strategies, well under 1 percent of enterprises have the ability to find a post-intrusion network attacker. Cyber criminals continue to have the potential for unimpeded, long-term success.

So how will attacks change in 2016? In this slideshow, David Thompson, Sr. Director of Product Management, LightCyber, has identified data breach trends we can expect to see in 2016.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.