The top predicted security threats for 2015 included the rapid growth of unknown malware and the exploit of vulnerabilities in platforms such as Android and iOS.
These were predicted by Check Point, and the issues continue to remain a significant threat. According to the company, cyber criminals are already preparing for more attacks in 2016.
“As we’ve seen from this year’s data breaches at Anthem, Harvard University, Experian, and TalkTalk, hackers are still finding creative ways to attack networks,” Check Point says in a statement.
After looking back on the cyber attacks of this year, Check Point is anticipating the next wave of threats, hoping organisations can use this information to stay ahead of the evolving tactics of cybercriminals.
Check Point has released its top ten predictions for security threats and trends that it expects to see in 2016:
‘Sniper’ and ‘shotgun’ malware
Hackers will not only customise malware, but they will increasingly use sophisticated phishing and social engineering tricks to gain access to sensitive data.
More mobile threats on the way
There have already been multiple high-profile vulnerabilities discovered this year, and Check Point says it expects that number of mobile vulnerabilities will only grow in 2016.
More businesses will turn to advanced threat prevention Traditional sandboxing will no longer protect against the growing malware landscape. CPU-level sandboxing will become more common as it is the only advanced solution that can detect and protect against evasive, unknown malware and zero-day attacks.
Critical infrastructures will be highly targeted
SCADA and ICS networks were not designed for security. Attacks against these systems have increased in recent years, and Check Point expects this trend to only get worse.
IoT and smart devices are still at risk
The Internet of Things will continue to emerge, and businesses will need to think about how to protect their smart devices and prepare for the wider adoption of IoT.
Wearables won’t be safe, either
Wearables like smartwatches will make their way into the enterprise, but this will also introduce new security risks and challenges as wearables can be hacked to capture video or record audio.
Trains, planes, and automobiles
2015 saw the beginning of car hacking. Modern cars are featuring more gadgetry and connected systems, and this will make vehicles just as vulnerable to today’s threats and attacks.
Real security for virtual environments
Organisations are moving to virtualised environments, which are complex and create network layers that can become an attack vector. Virtual environments will require new approaches to network security.
New environments will bring new threats
New operating systems such as Windows 10 and iOS 9 were launched this year. Hackers will take advantage of attacking these new operating systems because updates are more frequent and users are less familiar with the environments.
Organisations will look to security consolidation
To protect against advanced threats, security professionals will increase their reliance on centralised security management solutions. Consolidating security provides an effective way to cut complexity and make for easier management.