Cybersecurity to reach tipping point in 2017; Fortinet

Fortinet unveils six predictions that will rock the threat landscape in 2017

Tags: Cyber crime
  • E-Mail
Cybersecurity to reach tipping point in 2017; Fortinet Fortinet researchers anticipate cyber criminals will employ in the near future and demonstrate the potential impact of cyber-attacks to the global digital economy.
By  Aasha Bodhani Published  November 22, 2016

Fortinet predicts cyber threats will become more intelligent, autonomous and difficult to detect than ever before in 2017.

The cybersecurity solutions provider unveiled six predictions form the FortiGuard Labs that may dominate the threat landscape in 2017. These predictions reveal the methods and strategies that Fortinet researchers anticipate cyber criminals will employ in the near future and demonstrate the potential impact of cyber-attacks to the global digital economy.

Derek Manky, global security strategist at Fortinet, said: "The expanding attack surface enabled by technology innovations such as cloud computing and IoT devices, a global shortage of cybersecurity talent, and regulatory pressures continue to be significant drivers of cyber threats.

"The pace of these changes is unprecedented, resulting in a critical tipping point as the impact of cyber attacks are felt well beyond their intended victims in personal, political, and business consequences. Going forward, the need for accountability at multiple levels is urgent and real affecting vendors, governments, and consumers alike. Without swift action, there is a real risk of disrupting the progress of the global digital economy."

Fortinet's six predications include:

1. From smart to smarter: automated and human-like attacks will demand more intelligence defence : Threats are getting smarter and are increasingly able to operate autonomously. In the coming year we expect to see malware designed "human-like" with adaptive, success-based learning to improve the impact and efficacy of attacks.

2. IoT manufacturers will be accountable for security breaches: We will see an increase in the call to action from consumers, vendors and other interest groups for the creation and enforcement of security standards so that device manufacturers are held accountable for their device's behaviours out in the wild.

3. 20 billion IoT devices are the weakest link for attacking the cloud: We expect to see attacks designed to exploit endpoint devices, resulting in client side attacks that can effectively target and breach cloud providers. Organizations will increasingly adopt fabric-based security and segmentation strategies that enable them to create, orchestrate, and enforce seamless security policies between their physical, virtual, and private cloud environments from IoT to the cloud.

4. Attackers will begin to turn up the heat in smart cities: As building automation and management systems continue to grow over the next year they will be targeted by hackers. The potential for massive civil disruption should any of these integrated systems be compromised is severe, and are likely to be a high-value target for cybercriminals.

5. Ransomware was just the gateway malware: We expect to see very focused attacks against high-profile targets, such as celebrities, political figures, and large organisations. Automated attacks will introduce an economy of scale to ransomware that will allow hackers to cost-effectively extort small amounts of money from large numbers of victims simultaneously, especially by targeting IoT devices.

6. Technology will have to close the gap on the critical cyber skills shortage: The current shortage of skilled cybersecurity professionals means that many organisations or countries looking to participate in the digital economy globally will do so at great risk. They simply do not have the experience or training necessary to develop a security policy, protect critical assets that now move freely between network environments, or identify and respond to today's more sophisticated attacks.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code