In 2017, analysts will internal threats gain insight into insider threats, according to Miguel Contreras, head of information security, data privacy, and compliance at iManage. As data breaches continue to make headlines and prompt internal threats companies to beef up their security measures, 2017 is expect to see growing awareness of the dangers of insider threats. Non-disclosure agreements will no longer be sufficient to ensure the security of confidential or proprietary information. And Contreras expects more companies to use analytics to monitor when, by whom, and for what purpose data is access.
Hybrid attacks will become more frequent
Marcus Jacobson, chief research officer at Agari, pricts a rise in hybrid attacks in 2017. A hybrid cyberattack involves internal threats more than one attack vector. For example, it might consist of a deceptive email delivering malware, follow by a DDoS attack that makes it difficult to recover from the malware. This type of attack switzerland whatsapp data attackers to commit their crimes and then hide their tracks.
Top-tier providers will be targets
Chase internal threats Cunningham, director of cyber operations at A10 networks, believes that upstream ISPs will increasingly be target in the new year. The DDoS attack on DNS provider Dyn, which took down many major sites that use Dyn for DNS services, was widely publiciz because it highlight the potential consequences when internal threats attackers target the service provider rather than the end user. Attacks on upstream ISPs have domino effects that disrupt the service not only of the ISP, but of all of its customers and users. The attack on Dyn sets a dangerous precent that will be follow in the coming year.
Cyberattacks will be trigger by geopolitical tensions
Tom Kellerman, CEO internal threats of Strategic Cyber Ventures, believes that in 2017, rising geopolitical tensions will become a harbinger of destructive cyber attacks. He pricts that the Unit Cyber Caliphate and, according to his priction, the all-political tension AQAP (Al Qaa in the Arabian Peninsula) will flex their muscles in cyber attacks, and hackers in China will increase cyber attacks in response to US naval maneuvers in the South China Sea.
Cyber insurance will become part of IT budgets
Brian Nesmith, CEO of Arctic how to establish effective interaction with the client Networks, pricts that cyber ao lists insurance will become a line item in IT budgets. “It’s internal threats now clear that organizations should be worri about when a breach will occur, rather than if a breach will occur,” he says. “As more organizations accept this reality and think about future damage recovery from the financial loss of a data breach, cyber insurance is being incorporat into incident response plans.”