Security 2016: What to Expect in the New Year

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Next

Mobile Devices and IoT

Prediction: Motivation for mobile device hacks will continue to increase due to IoT.

With IoT, everything is connected. With so much more information at our fingertips, it gives cyber criminals more motivation and opportunities to steal your information. It only takes one device to be hacked for all of your personal information – from your home address to health records – to be in jeopardy. Why are cybercriminals targeting mobile? According to AppRiver, cybercriminals go where the numbers are. Most of the mobile malware that has been seen to date has been designed to target Android devices, with the main reasons being Android has the largest number of users and the most open platform. However, no system is immune from a mobile attack. When vulnerabilities like this exist in any popular OS and hackers know about them, it is only a matter of time before they are exploited.

Tip: Fortunately, since vulnerabilities are often discovered and patched, a simple update can determine whether you fall victim or not. Organizations best protect mobile users against this kind of attack by strongly encouraging/ensuring all users keep their devices up to date with the latest versions of their OS and prohibiting users from "jailbreaking" their devices. Additionally, every organization's security training should include reminders about safe browsing and identifying suspicious links.

As another year comes to an end, security experts are looking back at the trends and most notable breaches in 2015. From Anthem to the Office of Personnel Management to top security vendors falling victim to infiltration, 2015 was a banner year for malware, data breaches and advanced persistent threats (APTs).

Using what they've learned from the past year, cyber security experts are looking at what's ahead for 2016. With the ever-changing threat landscape and cyber criminals always working to stay one step ahead, it's important for organizations and consumers to take proper security measures. In this slideshow, experts from AppRiver, Cyphort and CounterTack look at what trends we can expect to see in the year ahead, as well as tips on how to prepare.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.