SlideShare une entreprise Scribd logo
1  sur  13
Cybersecurity
2016 Review and
2017 Preview
Looking at 2016 and 2017
As businesses become more reliant on IT to meet
customers’ changing wants and needs, systems get more
complex, vulnerabilities arise and data becomes more
attractive to hackers.
This slideshow reviews some of the biggest and most
newsworthy cybersecurity incidents in 2016, and looks at
potential issues for 2017. If there’s one lesson to be
learned here, it’s that every organization — large and
small — needs to be vigilant against cyberthreats.
Yahoo! (Not Once, But Twice)
The once venerable web services company announced in
2016 that it had been hacked twice in the past.
The 2014 hack, announced first, exposed 500 million
users. The 2013 hack, announced second, affected one
billion Yahoo! accounts, making it the largest breach in
history.
More reading: “Yahoo Says One Billion Accounts Were Hacked,” NY Times
LinkedIn
Approximately 117 million LinkedIn records were stolen in
2012, but the information began appearing online in 2016.
Users were prompted in 2012 to change their passwords;
those that hadn’t by 2016 had their passwords invalidated.
More reading: “Hackers Selling 117 Million LinkedIn Passwords,” CNN
Oracle
In 2016, Oracle’s MICROS point-of-sale (POS) system
was breached. The system was used in more than
300,000 POS registers around the world. The size and
scope of the breach is still unknown, but experts suspect
the hack was carried out by a Russian crime syndicate
called the Carbanak Gang.
MICROS is used by a wide range of retailers, hotels and
restaurants, from Burger King to Gucci.
More reading: “Data Breach at Oracle’s MICROS Point-of-Sale Division,” Krebs on Security
Dropbox
Dropbox, the file-storage platform, announced in 2016
that it was hacked in 2012, with 68 million usernames and
passwords stolen. The breach is traced back to an
employee using the same password for both Dropbox and
LinkedIn. (LinkedIn passwords had been compromised
previously, allowing hackers to access the employee’s
Dropbox work account.) Dropbox responded quickly,
resetting many users’ passwords.
More reading: “Dropbox Hack Leads to Leaking of 68m User Passwords on the Internet” — Guardian
Cisco
Because of an erroneous security setting on the mobile
Cisco careers site, job seekers’ personal information was
vulnerable to hacking. This information included names,
emails, resumes, phone numbers, usernames,
passwords, gender, race and veteran status. There is no
indication that this information was accessed by a
malicious party, as the vulnerability was discovered by an
independent researcher and handled immediately.
More reading: “Cisco Job Applicants Warned of Potential Mobile Site Data Leak” — ISN
U.S. Department of Justice
A total of 30,000 records about Department of Homeland
Security and FBI employees were stolen. The information
included names, titles, phone numbers and email
addresses. However, more sensitive information, such as
social security numbers, was not compromised.
More reading: “Justice, Homeland Security Probe Hack of DHS, FBI Employee Data” — NBC News
2017 Preview: Ransomware
In 2017, look for incidents of ransomware to increase.
Ransomware is software that allows a malicious party to
encrypt the data belonging to an individual or
organization. The user then must pay a ransom for the
decryption key. Organizations risk having their mission-
critical operations frozen until the ransom is paid. Several
hospitals were attacked with ransomware in 2016.
More reading: ”Beware the Rise of Ransomware” — Norton by Symantec (a security provider)
2017 Preview: IoT
The internet is no longer confined to computers,
smartphones and tablets. Many devices now connect to
the internet: vehicles, light switches, garage door openers,
refrigerators and more. These devices, collectively called
the Internet of Things (IoT), are attractive to
cybercriminals, who may use them to steal information or
conduct a Distributed Denial of Service (DDoS) attack.
More reading: “Why IoT Security Is So Critical” — TechCrunch
2017 Preview: Hacktivism
Both government entities and commercial enterprises are
at risk for hacktivism. In a report prepared for state and
federal legislators, 54 percent worry that they will be
breached by hacktivists — people or groups looking to
expose sensitive information or deny service through a
DDoS attack. Anonymous, a loose network of hacktivists,
may be the best known group; it has directed efforts
toward companies, government entities, churches and
service organizations around the world.
More reading: ”Understanding the Cyber Threat,” AT&T and the National Cybersecurity Alliance
2017 Preview: Third Parties
A chain is only as strong as its weakest link! That means
it’s no longer enough for an organization to secure its own
system — it’s imperative to make sure the third-party
vendors that have access to operations and data are
properly secured as well. The recent Wendy’s attack was
actually coordinated not on Wendy’s itself, but through a
malware attack on the fast food chain’s point-of-sale
system. Attacks like this are expected to grow in
frequency.
More reading: “The Challenges of Third-Party Risk Management,” NetworkWorld
2017 Preview: People
A recent report says that more than 200,000 cybersecurity
positions are currently unfilled in the U.S., and that
demand for cybersecurity professionals is growing 3.5
times faster than for IT jobs as a whole, and 12 times
faster than for other types of jobs. Companies might not
be able to reach their important cybersecurity goals simply
because they lack the right people with the right skills.
More reading: “Demand to Fill Cybersecurity Jobs Booming,” Peninsula Press

Contenu connexe

En vedette

Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitTim Harvey
 
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan PetitAutomotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan PetitSecurity Innovation
 
Doing Business with DHS (Feb 2015)
Doing Business with DHS  (Feb 2015)Doing Business with DHS  (Feb 2015)
Doing Business with DHS (Feb 2015)Tom "Blad" Lindblad
 
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...contactOpinionWay
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicInApp
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-NetherlandsDominika Rusek
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 

En vedette (13)

Cyber security
Cyber securityCyber security
Cyber security
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
 
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan PetitAutomotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
 
Doing Business with DHS (Feb 2015)
Doing Business with DHS  (Feb 2015)Doing Business with DHS  (Feb 2015)
Doing Business with DHS (Feb 2015)
 
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
Process-oriented Security Risk Analysis and Requirements Engineering
Process-oriented Security Risk Analysis and Requirements EngineeringProcess-oriented Security Risk Analysis and Requirements Engineering
Process-oriented Security Risk Analysis and Requirements Engineering
 
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 

Dernier

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 

Dernier (20)

How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 

Cybersecurity 2016 Review and 2017 Preview

  • 2. Looking at 2016 and 2017 As businesses become more reliant on IT to meet customers’ changing wants and needs, systems get more complex, vulnerabilities arise and data becomes more attractive to hackers. This slideshow reviews some of the biggest and most newsworthy cybersecurity incidents in 2016, and looks at potential issues for 2017. If there’s one lesson to be learned here, it’s that every organization — large and small — needs to be vigilant against cyberthreats.
  • 3. Yahoo! (Not Once, But Twice) The once venerable web services company announced in 2016 that it had been hacked twice in the past. The 2014 hack, announced first, exposed 500 million users. The 2013 hack, announced second, affected one billion Yahoo! accounts, making it the largest breach in history. More reading: “Yahoo Says One Billion Accounts Were Hacked,” NY Times
  • 4. LinkedIn Approximately 117 million LinkedIn records were stolen in 2012, but the information began appearing online in 2016. Users were prompted in 2012 to change their passwords; those that hadn’t by 2016 had their passwords invalidated. More reading: “Hackers Selling 117 Million LinkedIn Passwords,” CNN
  • 5. Oracle In 2016, Oracle’s MICROS point-of-sale (POS) system was breached. The system was used in more than 300,000 POS registers around the world. The size and scope of the breach is still unknown, but experts suspect the hack was carried out by a Russian crime syndicate called the Carbanak Gang. MICROS is used by a wide range of retailers, hotels and restaurants, from Burger King to Gucci. More reading: “Data Breach at Oracle’s MICROS Point-of-Sale Division,” Krebs on Security
  • 6. Dropbox Dropbox, the file-storage platform, announced in 2016 that it was hacked in 2012, with 68 million usernames and passwords stolen. The breach is traced back to an employee using the same password for both Dropbox and LinkedIn. (LinkedIn passwords had been compromised previously, allowing hackers to access the employee’s Dropbox work account.) Dropbox responded quickly, resetting many users’ passwords. More reading: “Dropbox Hack Leads to Leaking of 68m User Passwords on the Internet” — Guardian
  • 7. Cisco Because of an erroneous security setting on the mobile Cisco careers site, job seekers’ personal information was vulnerable to hacking. This information included names, emails, resumes, phone numbers, usernames, passwords, gender, race and veteran status. There is no indication that this information was accessed by a malicious party, as the vulnerability was discovered by an independent researcher and handled immediately. More reading: “Cisco Job Applicants Warned of Potential Mobile Site Data Leak” — ISN
  • 8. U.S. Department of Justice A total of 30,000 records about Department of Homeland Security and FBI employees were stolen. The information included names, titles, phone numbers and email addresses. However, more sensitive information, such as social security numbers, was not compromised. More reading: “Justice, Homeland Security Probe Hack of DHS, FBI Employee Data” — NBC News
  • 9. 2017 Preview: Ransomware In 2017, look for incidents of ransomware to increase. Ransomware is software that allows a malicious party to encrypt the data belonging to an individual or organization. The user then must pay a ransom for the decryption key. Organizations risk having their mission- critical operations frozen until the ransom is paid. Several hospitals were attacked with ransomware in 2016. More reading: ”Beware the Rise of Ransomware” — Norton by Symantec (a security provider)
  • 10. 2017 Preview: IoT The internet is no longer confined to computers, smartphones and tablets. Many devices now connect to the internet: vehicles, light switches, garage door openers, refrigerators and more. These devices, collectively called the Internet of Things (IoT), are attractive to cybercriminals, who may use them to steal information or conduct a Distributed Denial of Service (DDoS) attack. More reading: “Why IoT Security Is So Critical” — TechCrunch
  • 11. 2017 Preview: Hacktivism Both government entities and commercial enterprises are at risk for hacktivism. In a report prepared for state and federal legislators, 54 percent worry that they will be breached by hacktivists — people or groups looking to expose sensitive information or deny service through a DDoS attack. Anonymous, a loose network of hacktivists, may be the best known group; it has directed efforts toward companies, government entities, churches and service organizations around the world. More reading: ”Understanding the Cyber Threat,” AT&T and the National Cybersecurity Alliance
  • 12. 2017 Preview: Third Parties A chain is only as strong as its weakest link! That means it’s no longer enough for an organization to secure its own system — it’s imperative to make sure the third-party vendors that have access to operations and data are properly secured as well. The recent Wendy’s attack was actually coordinated not on Wendy’s itself, but through a malware attack on the fast food chain’s point-of-sale system. Attacks like this are expected to grow in frequency. More reading: “The Challenges of Third-Party Risk Management,” NetworkWorld
  • 13. 2017 Preview: People A recent report says that more than 200,000 cybersecurity positions are currently unfilled in the U.S., and that demand for cybersecurity professionals is growing 3.5 times faster than for IT jobs as a whole, and 12 times faster than for other types of jobs. Companies might not be able to reach their important cybersecurity goals simply because they lack the right people with the right skills. More reading: “Demand to Fill Cybersecurity Jobs Booming,” Peninsula Press