This post was originally published on this site

ltechnologygroup.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to amazon.com.

What’s Next for Cybersecurity in 2018? 

By Dwight Davis

Is it possible to anticipate what the coming year will bring us – pro and con – on the cybersecurity front? Making precise predictions about one of the most dynamic sectors in technology would be a fool’s errand, but some current trends are almost certain to continue, and likely accelerate.

First, the bad news. It’s not a secret that cyberthreats have multiplied, nor that successful attacks have grown in both volume and impact. The new AT&T Cybersecurity Insights report cites troubling data from a global survey AT&T sponsored. Among its findings: Nearly 80 percent of the surveyed organizations had been negatively affected by a cybersecurity attack in the prior 12 months.

Beneath that top-line number was the growing prominence of new forms of attack. Most notable among them were ransomware attacks and super-charged distributed denial of service (DDoS) assaults, the latter of which marshalled hundreds of thousands of Internet of Things (IoT) devices to create huge attack bots.

When asked about the biggest cybersecurity threats they anticipated in the coming year, 46 percent of the AT&T survey respondents cited ransomware. That percentage lagged only the longstanding threats from malware, worms and viruses (cited by 60 percent) and unauthorized access to corporate data (cited by 49 percent). Nearly one-third (32 percent) put IoT-based attacks on their list of top future concerns.

Unfortunately, ransomware attacks will almost certainly become more pervasive and varied during 2018. Some attacks will adhere to the brute-force model of infect, lock and extort, while others will be more sophisticated. In some cases, ransomware assaults will serve primarily as a diversionary tactic to draw security resources and attention away from other avenues of attack.

For their part, IoT-based DDoS attacks are likely to grow in both bot size and traffic volumes as they continue to  utilize poorly secured IoT devices. There will be millions of such vulnerable devices installed for years to come, with many device manufacturers only now starting to offer hardened versions of their products. Beyond specific threat types, we can expect to see attackers increasingly utilize the same technologies defenders are using for threat detection and response. For example, sophisticated attackers are already using big data analytics to scrutinize traffic patterns and search for opportunities and vulnerabilities that might not be evident without such broad and deep analysis.

Still, not every cybersecurity trend is bleak. Among the positive cybersecurity movements we’re likely to see in the coming year:

  • Continuing advances in, and use of, threat analytics, machine learning and other cutting-edge security technologies.
  • Expanding adoption of automated processes, not just in threat detection, but in incident response.
  • Growing use of managed and hosted security services, which will also become increasingly sophisticated.
  • Improved and more varied cyberinsurance offerings, some of which will be paired with risk assessment rating services.

One additional trend is gaining steam: the growth of alliances and intelligence sharing. In February, for example, AT&T and five other communications and security vendors joined forces to form the IoT Cybersecurity Alliance, which will educate on IoT best practices and raise awareness of how to better secure the IoT ecosystem.

Individual companies as well as security vendors are coming to realize that they need to collaborate and share information about attacks and effective defenses if they are to have any chance of countering the escalating cyberthreats they face.

Read the AT&T Cybersecurity Insights report Mind the Gap: Cybersecurity’s Big Disconnect. Learn more about how your organization can minimize gaps its cybersecurity strategy.

Dwight Davis has reported on and analyzed computer and communications industry trends, technologies and strategies for more than 35 years. All opinions expressed are his own. AT&T has sponsored this blog post.

At L Technology Group, we know technology alone will not protect us from the risks associated with in cyberspace. Hackers, Nation States like Russia and China along with “Bob” in HR opening that email, are all real threats to your organization. Defending against these threats requires a new strategy that incorporates not only technology, but also intelligent personnel who, eats and breaths cybersecurity. Together with proven processes and techniques combines for an advanced next-generation security solution. Since 2008 L Technology Group has develop people, processes and technology to combat the ever changing threat landscape that businesses face day to day.

Call Toll Free (855) 999-6425 for a FREE Consultation from L Technology Group, https://www.ltechnologygroup.com.