Security 2016: What to Expect in the New Year

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Security 2016: What to Expect in the New Year-5 Next

Sale of Data

Prediction: Data selling and nation-state attacks increase.

According to CounterTack, we will continue to see the selling of data by malicious actors to finance their organization's goals — whether it is nation-state or terrorist related. A recent Ponemon study showed that 35 percent of the organizations surveyed were certain they had already been victims of a nation-state attack.

Tip: Create a culture of security across the organization and make everyone a security stakeholder by ensuring training is targeted, repeatable and measurable. Second, it's critical to understand the delineations between nation-states targeting your organization vs. commodity malware processes running. From there, more intimately understanding an organization's threat landscape allows you to make the right decisions around detection, prevention, analysis and remediation of threats. 

As another year comes to an end, security experts are looking back at the trends and most notable breaches in 2015. From Anthem to the Office of Personnel Management to top security vendors falling victim to infiltration, 2015 was a banner year for malware, data breaches and advanced persistent threats (APTs).

Using what they've learned from the past year, cyber security experts are looking at what's ahead for 2016. With the ever-changing threat landscape and cyber criminals always working to stay one step ahead, it's important for organizations and consumers to take proper security measures. In this slideshow, experts from AppRiver, Cyphort and CounterTack look at what trends we can expect to see in the year ahead, as well as tips on how to prepare.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.