Security 2016: What to Expect in the New Year

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9
Next Security 2016: What to Expect in the New Year-7 Next


Prediction: Ransomware attacks will rise as victims continue to pay.

There's no question that Ransomware – malware that locks files and holds them as a ransom until the individual or organization pays to have them recovered – is increasingly on the rise. According to experts at AppRiver, the growth is happening because it is working. Victims continue to pay cyber criminals and in-turn the bad guys keep doing what's working so well for them. Unfortunately, by the time ransomware has been installed on your network, it's often too late to recover your files without paying the ransom. Preventing ransomware from getting onto your network, however, is fairly easy.

Tip: Organizations can protect themselves in a number of ways, including 1) backing up files on a daily basis; 2) ensuring all hardware and software is updated, as updates often contain security patches for malware vulnerabilities, and 3) adopting a layered online security approach. With the combined efforts of an anti-spam and malware email filter and web protection, organizations will be much more likely to keep malware off a network.

As another year comes to an end, security experts are looking back at the trends and most notable breaches in 2015. From Anthem to the Office of Personnel Management to top security vendors falling victim to infiltration, 2015 was a banner year for malware, data breaches and advanced persistent threats (APTs).

Using what they've learned from the past year, cyber security experts are looking at what's ahead for 2016. With the ever-changing threat landscape and cyber criminals always working to stay one step ahead, it's important for organizations and consumers to take proper security measures. In this slideshow, experts from AppRiver, Cyphort and CounterTack look at what trends we can expect to see in the year ahead, as well as tips on how to prepare.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.