Cyberoam Security Predictions for 2015

10 years ago

Highlights on IoT, i OS security, passwordless authentication and secure networks

Cyberoam’s Security Predictions for 2015 give an overview of industry trends and security challenges businesses are likely to come across in 2015.The predictions have been prepared with insights from the Cyberoam Threat Research Labs (CTRL).

Dark clouds over Internet of Things (IOT)

As SCADA systems adopt IOT, their exposure to cyber threats will increase. Remotely connected and automated building control systems also face a similar challenge. Meanwhile, mobile apps have started featuring in the Connected Car infrastructure and it is just a matter of time before the vulnerabilities are discovered.

Geo-Political Interference

Internet has become a critical tool for government sponsored propagandas, espionage and cyber-attacks. APT malwares sometimes used in these campaigns grossly undermine legal boundaries. If conditions deteriorate, which seems to be a decent probability in the coming year, there will be a larger impetus on cyber-attacks from the nations involved, some of which could be revealed during the year itself.

Legacy Protocols on target

The legacy protocols on which Internet seems to run all so well are far from perfect and cyber criminals will continue to exploit the loopholes to their advantage. Some of these protocols being open source face a larger threat.
Moreover, as the Internet makes transition from IPv4 to IPv6, cybercriminals would hunt for latent security gaps. One can also expect client side attacks exploiting application vulnerabilities in widely used frameworks like Adobe, Java, thereby aggravating network security challenges for IT admins in 2015.

Healthcare Bleeds

Healthcare sector needs significant improvements in its cyber-preparedness – a fact FBI made amply clear in 2014 when Community Health Systems faced a security breach leading to theft of 4.5 million patient records in the US. More such breaches are expected in 2015.

Malvertising and Attacks on Email

Malvertising (placing malware laden advertisements on reputed/popular webpages) is likely to become more of a nuisance in 2015.

Demand for Context Aware Security

Enterprises need a security model to interpret network traffic to identify suspicious patterns and events.

iOS on the radar of cyber-criminals; Android attacks to continue

As enterprises embrace Apple apps and use of iOS-based devices grows, these are getting on the radar of cyber criminals.

Solving the puzzle called ‘Password’

The quest for replacing ‘password’ as an authentication procedure will gain momentum. It is reported that an increasing number of millennials in the US prefer Apple’s Fingerprint Scan for authentication purpose.