Story image

Top 10 security threats for 2016

03 Dec 15

The top predicted security threats for 2015 included the rapid growth of unknown malware and the exploit of vulnerabilities in platforms such as Android and iOS.

These were predicted by Check Point, and the issues continue to remain a significant threat. According to the company, cyber criminals are already preparing for more attacks in 2016.

“As we’ve seen from this year’s data breaches at Anthem, Harvard University, Experian, and TalkTalk, hackers are still finding creative ways to attack networks,” Check Point says in a statement.

After looking back on the cyber attacks of this year, Check Point is anticipating the next wave of threats, hoping organisations can use this information to stay ahead of the evolving tactics of cybercriminals.

Check Point has released its top ten predictions for security threats and trends that it expects to see in 2016:

‘Sniper’ and ‘shotgun’ malware

Hackers will not only customise malware, but they will increasingly use sophisticated phishing and social engineering tricks to gain access to sensitive data.

More mobile threats on the way

There have already been multiple high-profile vulnerabilities discovered this year, and Check Point says it expects that number of mobile vulnerabilities will only grow in 2016.

More businesses will turn to advanced threat prevention Traditional sandboxing will no longer protect against the growing malware landscape. CPU-level sandboxing will become more common as it is the only advanced solution that can detect and protect against evasive, unknown malware and zero-day attacks.

Critical infrastructures will be highly targeted

SCADA and ICS networks were not designed for security. Attacks against these systems have increased in recent years, and Check Point expects this trend to only get worse.

IoT and smart devices are still at risk

The Internet of Things will continue to emerge, and businesses will need to think about how to protect their smart devices and prepare for the wider adoption of IoT.

Wearables won’t be safe, either

Wearables like smartwatches will make their way into the enterprise, but this will also introduce new security risks and challenges as wearables can be hacked to capture video or record audio.

Trains, planes, and automobiles

2015 saw the beginning of car hacking. Modern cars are featuring more gadgetry and connected systems, and this will make vehicles just as vulnerable to today’s threats and attacks.

Real security for virtual environments

Organisations are moving to virtualised environments, which are complex and create network layers that can become an attack vector. Virtual environments will require new approaches to network security.

New environments will bring new threats

New operating systems such as Windows 10 and iOS 9 were launched this year. Hackers will take advantage of attacking these new operating systems because updates are more frequent and users are less familiar with the environments.

Organisations will look to security consolidation

To protect against advanced threats, security professionals will increase their reliance on centralised security management solutions. Consolidating security provides an effective way to cut complexity and make for easier management.

AlgoSec delivers native security management for Azure Firewall
AlgoSec’s new solution will allow a central management capability for Azure Firewall, Microsoft's new cloud-native firewall-as-a-service.
Kiwis losing $24.7mil to scam calls every year
The losses are almost five times higher compared to the same period last year, from reported losses alone.
How to configure your firewall for maximum effectiveness
ManageEngine offers some firewall best practices that can help security admins handle the conundrum of speed vs security.
Exclusive: Why Australian enterprises are prime targets for malware attacks
"Only 14% of Australian organisations are continuously training employees to spot cyber attacks."
Exclusive: Why botnets will swarm IoT devices
“What if these nodes were able to make autonomous decisions with minimal supervision, use their collective intelligence to solve problems?”
"Is this for real?" The reality of fraud against New Zealanders
Is this for real? More often than not these days it can be hard to tell, and it’s okay to be a bit suspicious, especially when it comes to fraud.
Why you should leverage a next-gen firewall platform
Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.
The quid pro quo in the IoT age
Consumer consciousness around data privacy, security and stewardship has increased tenfold in recent years, forcing businesses to make customer privacy a business imperative.