CTO Insights: Looking Back, Moving Forward
2015 is over, but it has been a big year for security. We’ve seen some of the biggest data breaches on record, fallout from crippling hacktivism attacks, and new highs in security spending. We’ve also seen state-sponsored attacks, ransomware, and other security issues receiving more attention globally, both in newsrooms and at the government level.
In our 2016 predictions, we said that we will witness advancements in existing technologies—both for crimeware and everyday use, and that these new developments will bring new attack scenarios. According to Trend Micro CTO Raimund Genes, ransomware will continue to thrive this year, and even with good security practices, or even when victims pay the ransom, cybercriminals will still find other ways to extort more money from their victims. Unfortunately, even when users know that paying the ransom is what fuels the cybercriminal scheme, they will still pay. Additionally, we also predict the failure of a consumer grade smart device that will turn lethal, as vulnerabilities will not always be detected before something bad happens.While we see these critical developments take place, security in 2016 will be better as organizations and users will be more aware that data protection is important and that IT security is a part of the normal process of how businesses operate. Companies are advised to invest in data protection, processes, people, and all the necessary tools needed to defend against cybercrime and other threats.
Like it? Add this infographic to your site:
1. Click on the box below. 2. Press Ctrl+A to select all. 3. Press Ctrl+C to copy. 4. Paste the code into your page (Ctrl+V).
Image will appear the same size as you see above.
- Ransomware Spotlight: TargetCompany
- Email Threat Landscape Report: Cybercriminal Tactics, Techniques That Organizations Need to Know
- Preventing an Imminent Ransomware Attack With Early Detection and Investigation
- Inside the Halls of a Cybercrime Business
- Securing Cloud-Native Environments with Zero Trust: Real-World Attack Cases