• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   CTO Insights   »   CTO Insights : Will 2016 Be a Better Year for Cyber Security?

CTO Insights : Will 2016 Be a Better Year for Cyber Security?

  • Posted on:February 4, 2016 at 1:31 am
  • Posted in:CTO Insights, Internet of Things
  • Author:Raimund Genes (Chief Technology Officer)
0

2015 was a big challenge for cyber security. There were a lot of fireworks with all the high profile targets and attackers that made headlines. But now we can ask, will 2016 be a better year for cyber security? What are we – both end users and the security industry – going to do to make 2016 a better year? .

Our 2016 predictions made bold claims about what will happen in the next 12 months. We can simply wait for these to happen, or we can prepare ourselves before they do happen. We just have to remember that cyber security is as much as prevention as it is negating the effects of these attacks. So we need to do our part in the process.

One thing is for certain, the security industry will deal with ransomware, and a lot of it. People ask if paying ransom is a good or bad idea. If people just backed up their important files, the question doesn’t need to be asked anymore. That is why everyone should learn how to properly handle personal data. The problem is, people only learn about these things once they become the victims.

We also predict that the failure of a consumer grade smart device will turn lethal. Just think about it for a moment. How much devices do we entrust to the internet? Sure, it would be more convenient for companies. You know who else benefits from that? Cybercriminals. We have to keep in mind that vulnerabilities will not always be detected before something bad happens. And by then, unfortunately, it would be too late.

We also spoke of Data Protection Officers, or the lack thereof. It will be crucial for companies to employ Data Protection Officers, but even then it will be an uphill battle for various reasons, including cultural differences. For example, In Germany, having a Data Protection Officers is necessary by law, but in other countries, it’s not. Companies might even think that they don’t need one. They could say “We already have an IT department, why should we hire a Data Protection Officer?” Every major company needs to know what the role is, especially with the upcoming EU Data Protection regulation which will be a law by 2018.

Let’s face it, bad things will always happen. The fight against cybercrime will not be won through attrition. That is why this year will truly be a test. Everyone has to work in order to have a better year regardless if you’re just regularly backing up important data, assessing if a device is too risky to be accessed remotely, or hiring a Data Protection Officer. By doing the basics well, by accomplishing all these, only then can we be closer to having a more secure year.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: 2016 pred2016 predictionsIOTransomware

Security Predictions for 2020

  • Cybersecurity in 2020 will be viewed through many lenses — from differing attacker motivations and cybercriminal arsenal to technological developments and global threat intelligence — only so defenders can keep up with the broad range of threats.
    Read our security predictions for 2020.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Recent Posts

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits
  • August Patch Tuesday Fixes Critical IE, Important Windows Vulnerabilities Exploited in the Wild
  • Water Nue Phishing Campaign Targets C-Suite’s Office 365 Accounts

Popular Posts

Sorry. No data so far.

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.