Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 5 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Data Security Predictions for 2017

by The Gurus
December 8, 2016
in This Week's Gurus
Share on FacebookShare on Twitter

“This year has been a year of high profile hack after high profile hack.  It seems we still are to learn the lessons of the vital role of data security procedures in order to keep ourselves safe”, says Colin Tankard, Managing Director of data security company, Digital Pathways.
Here, Tankard outlines his predictions for the data security world in 2017.

  1. Nation state hacks will increase but will be focused on commercial espionage rather than political drivers. This is because of the general decline in prosperity in Asia and the need to seek new products or technologies.
  1. There will be a rise in hacks into cloud-based networks, simply due to the increase in companies and individuals embracing the service and thinking it is secure. Invariably users do not protect their data themselves and expect the service provider to do it. This misconception is exposing data to easy exploits that could be fixed by users encrypting their data before they hand it over to an unseen cloud service provider.
  1. There will be an increase in BotNet storms leading to more DDoS attacks. This has built up over the past two years due to the increase in interconnected devices through the Internet. The more devices attach, the more botnets can be installed and controlled.
  1. We will see an increase in home-attached devices being compromised. Smart TV’s WiFi kettles, home security systems and wireless cameras are all connected to our home networks and most of these do not have robust security within them. Often there is no password change facility, or they use weak chip sets with known vulnerabilities which, when compromised, can identify the wireless encryption key thus allowing the hacker to fully connect to the network.
  1. 2017 will also see the enforcement of a number of Acts (Patriot Act, RiPA, Draft Communications Data Bill etc.) in readiness for the General Data Protection Regulation (GDPR) coming into force in 2018. The result of such enforcements might not be directed at an individual or organisation but could still stop them having access to their data due to a third party being the target of the enforcement and the servers they were using being impounded, thus denying the valid user access to their data.
  1. We will see a change in attitude to disaster recovery as, historically, data was backed up, at best, on a weekly basis, with each back up being over written the following week. But now, with the increase in ransomware attacks, companies are finally realising that they need more historical data back-ups are starting to hold back-ups for weeks, if not months, in order to ensure that they can go a long way back in time before the ransomware was first installed.
  1. We will see the dawning of network monitoring for all sizes of organisation. Often seen as a luxury, now it is a must in the early detection of a network or data breach, as it is taking, on average, eight months for an organisation to detect a breach.
  1. With the impending GDPR regulation coming in May 2018 organisations will need to implement forms of user monitoring and especially install protective marking of data to ensure it is not leaked to unauthorised individuals. This will help organisations avoid the high fines allowed within the GDPR rules which, currently, are set at 4% of worldwide gross turnover.
  1. The decline in mobile apps will begin, as this space is getting too crowded. The cost of developing, supporting, marketing, upgrading and maintaining the mobile app is much higher than originally anticipated and coupling this with the very real issue of app security, means that the risk of a breach via an app is too risky for most companies to underwrite.
  1. Lastly, I would like 2017 to see a WiFi enabled coffee mug invented, in order to notify any interested parties that I need a top up!
FacebookTweetLinkedIn
ShareTweetShare
Previous Post

South West business people armed with techniques to combat cyber-crime at cyber security event

Next Post

87% of UK businesses confess to not considering data sovereignty post Brexit

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information