Top 5 Cyber Security Threats in 2018

By:  |  Category: Blog, Security Tuesday, January 9th, 2018  |  No Comments

This last year saw a rise in cybercrime and we at EnhancedTECH don’t expect 2018 to be any different. Cyber challenges will grow as criminals become more sophisticated and cyber assaults more common. Knowing the current climate, we have assembled, the top 5 cloud security threat predictions for 2018 in order to help you plan ahead.

1. Manage What You Can, because you can’t protect everything all the time. This is the wisdom of Earl Perkins, a research vice president at Gartner, who raised the issue at a Gartner Security and Risk Management Summit earlier this year. “Take the money you’re spending on prevention and begin to drive it more equitably to detection and response,” Perkins said. “The truth is, that you won’t be able to stop every threat and you need to get over it.”

That means adapting your security systems to focus on detection, response and remediation, which is how the cyber security fight is changing today, according to Perkins. “In the future it will most likely move to prediction of what’s coming before anything happens.

2. The Cloud will Adjust to New Security Threats. The current vulnerability of the cloud will lead to the development of new security guidelines for private and public cloud use that will use a cloud decision model to assess and work to resolve cloud risks, according to Gartner.

3. To strengthen cloud security, DevOps will morph into DevSecOps, with an emphasis on security as companies work more directly to bring together software development and overall operations, according to Gartner. By running these departments in tangent, security can be interwoven as code is developed, rather than post-creation when applications are already in the cloud.

4. IoT(The internet of things)will continue to usher in a new set of challenges to the cloud, including a bevy of unmanaged risks that users, manufacturers and companies didn’t see coming down the road, according to the Information Security Forum. The ISF, a London-based authority on cyber, information security and risk management, recently released a list of its own 2018 cybersecurity threat predictions.

Many organizations will rush into IoT devices with gusto, not anticipating that these devices are often vulnerable by design and allow opportunities for attackers,” Steve Durbin, managing director of the ISM, said in a statement. “In addition, there will be an increasing lack of transparency in the rapidly-evolving IoT ecosystem, with vague terms and conditions that allow organizations to use personal data in ways customers did not intend. It will be problematic for organizations to know what information is leaving their networks or what data is being secretly captured and transmitted by devices such as smartphones and smart TVs.”

5. Crime-as-a-Service will continue to gain ground. Global criminal organizations will continue their ongoing development and become increasingly more sophisticated according to Durbin. “The complex hierarchies, partnerships and collaborations that mimic large private sector organizations will facilitate their diversification into new markets and the commoditization of their activities at a global level,” including in targets in the cloud.

“Organizations will struggle to keep pace with this increased sophistication and the impact will extend worldwide, with cryptoware becoming the leading malware of choice for its threat and impact value,” said Durbin. “The resulting cyber incidents in the coming year will be more persistent and damaging than organizations have experienced previously, leading to business disruption and loss of trust in existing security controls.”

The growing number of information security threats are “jeopardizing the veracity and reputation of today’s most reliable organizations,” he said. “In 2018, we will see increased sophistication in the threat landscape with threats being personalized to their target’s weak spots or metamorphosing to take account of defenses that have already been put in place.”

As you map out your 2018 cyber security plan remember to include:

• A Strong Firewall specific to your environment
• Business Continuity and Disaster Recovery
• An Antivirus System

If you need assistance with a comprehensive cyber security plan give EnhancedTECH a call and we can assist you. Reach us at 714-970-9330 or contact us at sales@enhancedtech.com.for a complimentary consultation.

Samantha Keller

Samantha Keller

Director of Marketing and PR at EnhancedTECH
Samantha Keller (AKA Sam) is a published author, tech-blogger, event-planner and mother of three fabulous humans. Samantha has worked in the IT field for the last fifteen years, intertwining a freelance writing career along with technology sales, events and marketing. She began working for EnhancedTECH ten years ago after earning her Bachelor’s degree from UCLA and attending Fuller Seminary. She is a lover of kickboxing, extra-strong coffee, and Wolfpack football.Her regular blog columns feature upcoming tech trends, cybersecurity tips, and practical solutions geared towards enhancing your business through technology.
Samantha Keller
Leave a Comment
Read previous post:
meltdown and spectre
What are Meltdown and Spectre?

Meltdown and Spectre: 2018 is kicking off as a year of massive redesign in the processor world thanks to issues...

Close