• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Current News   »   A look ahead: Cyber security predictions for 2015

A look ahead: Cyber security predictions for 2015

  • Posted on:December 16, 2014
  • Posted in:Current News, Cybercrime, Encryption, Industry News, Mobility, Vulnerabilities & Exploits
  • Posted by:
    Trend Micro
0

As the new year fast approaches, many enterprises have cyber security at the forefront of their concerns. This year proved to be a milestone for data breaches and new attack methods continue to emerge every day. A wider variety of threat actors have come onto the scene over the course of 2014, leading to a wider variety of attack methods and a shift in the entry points used by hackers.

While the United States and China have always traded blows in the cyber security arena, data breaches and hacks coming from Russian actors are a relatively new occurrence. This year saw a major influx of cyber activity from former Soviet nationsĀ and most industry experts agree that 2015 will bring more of the same. Especially as the governments of the U.S. and Russia continue to grapple with one another, cyber espionage and theft of sensitive data will encourage an increase in this type of behavior.

“For better or worse, the cyber world is changing faster than the security models used by most organizations, and that will continue to leave us vulnerable to cyber criminals,” said Dave Frymier, vice president and CISO at Unisys, in an interview with Help Net Security.

Below are some of the cyber security trends that are likely to be seen in 2015:

Attacks targeting devices connected to the Internet of Things
Information has become the new global currency, with seemingly innocuous pieces of personal data able to be used to create devastating social engineering attacks that can result in the loss of Social Security numbers, financial information or other forms of sensitive data. While thieves have been after credit card numbers for years, now things like email passwords and application log ins are desirable targets for cyber criminals.

The Internet of Things is one of the most talked-about advances of the technological age and billions of devices are set to be connected to it in the coming years. A growing number of machines are now Internet-enabled, from coffee makers to washing machines and everything in between. And while this is sure to offer many benefits in the long run, in the short term it creates a multitude of new entry points for hackers to exploit when looking for a way to steal privileged data.

Trend Micro researchers Geoff Grindrod and Katie Wen noted in a blog post that one of the most important considerations to take when utilizing a device connected to the IoT is to implement automatic security updates. Not all vendors offer this option, but those that don’t usually provideĀ a semi-automatic process that makes the update available and then sends continuous reminders for users to download the new software.

Grindrod and Wen recommend that all users, even those taking advantage of automatic security updates, utilize some form of data encryption for their IoT-connected devices. Ensuring that encryption capabilities are turned on and are being used properly is an important step to take when working toward protecting personal information and the networks it is stored on.

Threats to mobile devices
Just as the IoT gained prominence in 2014, mobility became increasingly important this year. More companies than ever implemented bring-your-own-device policies, cloud computing and remote working options to encourage mobility among their employees, and all of those initiatives were made possible through the easy availability of sophisticated mobile devices.

According to information from Trend Micro, the number of global smartphone subscribers is expected to reach 3.5 billion within the next five years. Laptops, smartphones, tablets, e-readers and now wearables have all become mainstays in modern offices, and hackers know this. The use of mobile malware exploded in 2014, with cyber criminals leveraging the popularity of certain entertainment and banking applications to trick users into loading malicious software onto their devices.

The emergence of mobile malware specifically targeting financial information is especially worrying as new services like Apple Pay – where a user’s banking data is stored within their phone so they can pay for things without a credit card – become increasingly popular. As consumers rely moreĀ on their devices for a growing number of daily functions, the ability to protect phones and tablets will become more important than ever before.

A recent Trend Micro blog post pointed out that there are a few easy steps organizations can take to increase security when introducing mobile devices to their networks. Requiring certain default settings remain unchanged (such as those enabling encryption capabilities), blocking the use of certain questionable app stores and banning the use of any jailbroken or rooted devices all dramatically reduce the cyber threats facing enterprise networks.

While it is beneficial for enterprises to implement these security measures, there is still the possibility that attacks will find their way through. The ever present specter of cyber attacks is what will cause the next trend on the list to become more prevalent in 2015.

Increased cyber security spending/larger emphasis on encryption
Tech giants Apple and Google have already begun to lead the charge towardĀ an enhanced focus on cyber security and encryption in particular. Improving security postures has been important to companies for a while now, but a greater level of attention has been paid to implementing data encryption in recent months as more attacks targeting specific pieces of information take place. In 2015, a growing number of businesses setting aside funds for this specific purpose are likely to be seen.

In an October blog post, Trend Micro researchers noted that businesses need to inventory the data they have in order to decide which pieces are the most valuable. Sifting through information stored in servers, endpoints, networks and cloud environments allows an organization to gain a comprehensive overview of their current threat landscape. Once core data has been identified, the bulk of an enterprise’s security efforts should go toward encrypting and protecting it. Utilizing central policy management ensures data is protected while being transferred from one location to another and can be used throughout all layers of security.

Related posts:

  1. Malware trends and cyber security considerations for 2015
  2. Expert insight: Top cybersecurity predictions for 2015
  3. A look at mobile malware: Worst samples of 2014 and predictions for 2015
  4. Cyber security’s most challenging days are ahead

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, ę—„ęœ¬, ėŒ€ķ•œėÆ¼źµ­, å°ē£
  • Latin America Region (LAR): Brasil, MĆ©xico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Ɩsterreich / Schweiz, Italia, Š Š¾ŃŃŠøŃ, EspaƱa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.