2016 Information Security Predictions

Companies will try harder than ever to put in place the best security systems and hire the best security personnel in their never-ending quest for fending off attacksbut the weak links will remain, and cyber crooks know this. Security experts, working with automakers, will crack down on protection strategies to keep cyber attacks at bay.

Firmware/Hardware

Cars, et al

Wearable Devices

The Cloud

Not only will this kind of attack continue, but an offshoot of itI will infect someones device with ransomware for you for a reasonable pricewill likely expand.

Lets not forget about cloud services, which are protected by security structures that cyber thieves will want to attack. Best practices will need hardcore revisions.

No doubt, assaults on firmware and hardware are sure to happen.

No bones about it, 2016 is sure to see some spectacular, news-chomping data breaches, predicts many in infosec. You can bet that many attacks will be driven towards employees home systems as portals to the companys network.

Cyber crooks dont care what kind of data is in that little device strapped around your upper arm while you exercise, but theyll want to target it as a passageway to your smartphone. In time, it may be feasible for the government to get involved with sharing this intelligence. The result could mean wide-scale disruption for a business.

A companys weakest links are often their employees when it comes to cybersecurity. If you thought 2015 was interesting, get your seatbelt and helmet on and prepare for lift off

Threat Intelligence Sharing

Ransomware

Linked Stolen Data

Transaction Interception

The Weak Links

Its possible: Your paycheck, thats been directly deposited into your bank for years, suddenly starts getting deposited into a different accountthat belonging to a cyber thief. Think of wearables as conduits to your personal life.

Businesses and security vendors will do more sharing of threat intelligence. Snatching control of a transaction (integrity attack) means that the thief will be able to steal your money or a big businesss money.

The black market for stolen data will be even more inviting to crooks because the data will be in sets linked together.. Lets hope that 2016 (or any year, actually) wont be the year that a cyber punk deliberately crashes an Internet connected van carrying a junior high schools soccer team