SlideShare una empresa de Scribd logo
1 de 13
Cybersecurity
2016 Review and
2017 Preview
Looking at 2016 and 2017
As businesses become more reliant on IT to meet
customers’ changing wants and needs, systems get more
complex, vulnerabilities arise and data becomes more
attractive to hackers.
This slideshow reviews some of the biggest and most
newsworthy cybersecurity incidents in 2016, and looks at
potential issues for 2017. If there’s one lesson to be
learned here, it’s that every organization — large and
small — needs to be vigilant against cyberthreats.
Yahoo! (Not Once, But Twice)
The once venerable web services company announced in
2016 that it had been hacked twice in the past.
The 2014 hack, announced first, exposed 500 million
users. The 2013 hack, announced second, affected one
billion Yahoo! accounts, making it the largest breach in
history.
More reading: “Yahoo Says One Billion Accounts Were Hacked,” NY Times
LinkedIn
Approximately 117 million LinkedIn records were stolen in
2012, but the information began appearing online in 2016.
Users were prompted in 2012 to change their passwords;
those that hadn’t by 2016 had their passwords invalidated.
More reading: “Hackers Selling 117 Million LinkedIn Passwords,” CNN
Oracle
In 2016, Oracle’s MICROS point-of-sale (POS) system
was breached. The system was used in more than
300,000 POS registers around the world. The size and
scope of the breach is still unknown, but experts suspect
the hack was carried out by a Russian crime syndicate
called the Carbanak Gang.
MICROS is used by a wide range of retailers, hotels and
restaurants, from Burger King to Gucci.
More reading: “Data Breach at Oracle’s MICROS Point-of-Sale Division,” Krebs on Security
Dropbox
Dropbox, the file-storage platform, announced in 2016
that it was hacked in 2012, with 68 million usernames and
passwords stolen. The breach is traced back to an
employee using the same password for both Dropbox and
LinkedIn. (LinkedIn passwords had been compromised
previously, allowing hackers to access the employee’s
Dropbox work account.) Dropbox responded quickly,
resetting many users’ passwords.
More reading: “Dropbox Hack Leads to Leaking of 68m User Passwords on the Internet” — Guardian
Cisco
Because of an erroneous security setting on the mobile
Cisco careers site, job seekers’ personal information was
vulnerable to hacking. This information included names,
emails, resumes, phone numbers, usernames,
passwords, gender, race and veteran status. There is no
indication that this information was accessed by a
malicious party, as the vulnerability was discovered by an
independent researcher and handled immediately.
More reading: “Cisco Job Applicants Warned of Potential Mobile Site Data Leak” — ISN
U.S. Department of Justice
A total of 30,000 records about Department of Homeland
Security and FBI employees were stolen. The information
included names, titles, phone numbers and email
addresses. However, more sensitive information, such as
social security numbers, was not compromised.
More reading: “Justice, Homeland Security Probe Hack of DHS, FBI Employee Data” — NBC News
2017 Preview: Ransomware
In 2017, look for incidents of ransomware to increase.
Ransomware is software that allows a malicious party to
encrypt the data belonging to an individual or
organization. The user then must pay a ransom for the
decryption key. Organizations risk having their mission-
critical operations frozen until the ransom is paid. Several
hospitals were attacked with ransomware in 2016.
More reading: ”Beware the Rise of Ransomware” — Norton by Symantec (a security provider)
2017 Preview: IoT
The internet is no longer confined to computers,
smartphones and tablets. Many devices now connect to
the internet: vehicles, light switches, garage door openers,
refrigerators and more. These devices, collectively called
the Internet of Things (IoT), are attractive to
cybercriminals, who may use them to steal information or
conduct a Distributed Denial of Service (DDoS) attack.
More reading: “Why IoT Security Is So Critical” — TechCrunch
2017 Preview: Hacktivism
Both government entities and commercial enterprises are
at risk for hacktivism. In a report prepared for state and
federal legislators, 54 percent worry that they will be
breached by hacktivists — people or groups looking to
expose sensitive information or deny service through a
DDoS attack. Anonymous, a loose network of hacktivists,
may be the best known group; it has directed efforts
toward companies, government entities, churches and
service organizations around the world.
More reading: ”Understanding the Cyber Threat,” AT&T and the National Cybersecurity Alliance
2017 Preview: Third Parties
A chain is only as strong as its weakest link! That means
it’s no longer enough for an organization to secure its own
system — it’s imperative to make sure the third-party
vendors that have access to operations and data are
properly secured as well. The recent Wendy’s attack was
actually coordinated not on Wendy’s itself, but through a
malware attack on the fast food chain’s point-of-sale
system. Attacks like this are expected to grow in
frequency.
More reading: “The Challenges of Third-Party Risk Management,” NetworkWorld
2017 Preview: People
A recent report says that more than 200,000 cybersecurity
positions are currently unfilled in the U.S., and that
demand for cybersecurity professionals is growing 3.5
times faster than for IT jobs as a whole, and 12 times
faster than for other types of jobs. Companies might not
be able to reach their important cybersecurity goals simply
because they lack the right people with the right skills.
More reading: “Demand to Fill Cybersecurity Jobs Booming,” Peninsula Press

Más contenido relacionado

Destacado

Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitTim Harvey
 
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan PetitAutomotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan PetitSecurity Innovation
 
Doing Business with DHS (Feb 2015)
Doing Business with DHS  (Feb 2015)Doing Business with DHS  (Feb 2015)
Doing Business with DHS (Feb 2015)Tom "Blad" Lindblad
 
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...contactOpinionWay
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicInApp
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-NetherlandsDominika Rusek
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Planbenefitexpress
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 

Destacado (13)

Cyber security
Cyber securityCyber security
Cyber security
 
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing SummitProgam slides | December 17, 2013 | Federal Cloud Computing Summit
Progam slides | December 17, 2013 | Federal Cloud Computing Summit
 
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan PetitAutomotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
Automotive Cybersecurity Challenges for Automated Vehicles: Jonathan Petit
 
Doing Business with DHS (Feb 2015)
Doing Business with DHS  (Feb 2015)Doing Business with DHS  (Feb 2015)
Doing Business with DHS (Feb 2015)
 
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...
OpinionWay pour Orange - La perception des enjeux de la cybersécurité par les...
 
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An InfographicTop 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
Top 5 Cybersecurity Threats to Watch Out for in 2017 - An Infographic
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
Process-oriented Security Risk Analysis and Requirements Engineering
Process-oriented Security Risk Analysis and Requirements EngineeringProcess-oriented Security Risk Analysis and Requirements Engineering
Process-oriented Security Risk Analysis and Requirements Engineering
 
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlandsdeloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
deloitte-nl-risk-cyber-value-at-Risk-in-the-Netherlands
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
PECB Webinar: Cybersecurity Guidelines – Introduction to ISO 27032
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 

Último

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 

Último (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 

Cybersecurity 2016 Review and 2017 Preview

  • 2. Looking at 2016 and 2017 As businesses become more reliant on IT to meet customers’ changing wants and needs, systems get more complex, vulnerabilities arise and data becomes more attractive to hackers. This slideshow reviews some of the biggest and most newsworthy cybersecurity incidents in 2016, and looks at potential issues for 2017. If there’s one lesson to be learned here, it’s that every organization — large and small — needs to be vigilant against cyberthreats.
  • 3. Yahoo! (Not Once, But Twice) The once venerable web services company announced in 2016 that it had been hacked twice in the past. The 2014 hack, announced first, exposed 500 million users. The 2013 hack, announced second, affected one billion Yahoo! accounts, making it the largest breach in history. More reading: “Yahoo Says One Billion Accounts Were Hacked,” NY Times
  • 4. LinkedIn Approximately 117 million LinkedIn records were stolen in 2012, but the information began appearing online in 2016. Users were prompted in 2012 to change their passwords; those that hadn’t by 2016 had their passwords invalidated. More reading: “Hackers Selling 117 Million LinkedIn Passwords,” CNN
  • 5. Oracle In 2016, Oracle’s MICROS point-of-sale (POS) system was breached. The system was used in more than 300,000 POS registers around the world. The size and scope of the breach is still unknown, but experts suspect the hack was carried out by a Russian crime syndicate called the Carbanak Gang. MICROS is used by a wide range of retailers, hotels and restaurants, from Burger King to Gucci. More reading: “Data Breach at Oracle’s MICROS Point-of-Sale Division,” Krebs on Security
  • 6. Dropbox Dropbox, the file-storage platform, announced in 2016 that it was hacked in 2012, with 68 million usernames and passwords stolen. The breach is traced back to an employee using the same password for both Dropbox and LinkedIn. (LinkedIn passwords had been compromised previously, allowing hackers to access the employee’s Dropbox work account.) Dropbox responded quickly, resetting many users’ passwords. More reading: “Dropbox Hack Leads to Leaking of 68m User Passwords on the Internet” — Guardian
  • 7. Cisco Because of an erroneous security setting on the mobile Cisco careers site, job seekers’ personal information was vulnerable to hacking. This information included names, emails, resumes, phone numbers, usernames, passwords, gender, race and veteran status. There is no indication that this information was accessed by a malicious party, as the vulnerability was discovered by an independent researcher and handled immediately. More reading: “Cisco Job Applicants Warned of Potential Mobile Site Data Leak” — ISN
  • 8. U.S. Department of Justice A total of 30,000 records about Department of Homeland Security and FBI employees were stolen. The information included names, titles, phone numbers and email addresses. However, more sensitive information, such as social security numbers, was not compromised. More reading: “Justice, Homeland Security Probe Hack of DHS, FBI Employee Data” — NBC News
  • 9. 2017 Preview: Ransomware In 2017, look for incidents of ransomware to increase. Ransomware is software that allows a malicious party to encrypt the data belonging to an individual or organization. The user then must pay a ransom for the decryption key. Organizations risk having their mission- critical operations frozen until the ransom is paid. Several hospitals were attacked with ransomware in 2016. More reading: ”Beware the Rise of Ransomware” — Norton by Symantec (a security provider)
  • 10. 2017 Preview: IoT The internet is no longer confined to computers, smartphones and tablets. Many devices now connect to the internet: vehicles, light switches, garage door openers, refrigerators and more. These devices, collectively called the Internet of Things (IoT), are attractive to cybercriminals, who may use them to steal information or conduct a Distributed Denial of Service (DDoS) attack. More reading: “Why IoT Security Is So Critical” — TechCrunch
  • 11. 2017 Preview: Hacktivism Both government entities and commercial enterprises are at risk for hacktivism. In a report prepared for state and federal legislators, 54 percent worry that they will be breached by hacktivists — people or groups looking to expose sensitive information or deny service through a DDoS attack. Anonymous, a loose network of hacktivists, may be the best known group; it has directed efforts toward companies, government entities, churches and service organizations around the world. More reading: ”Understanding the Cyber Threat,” AT&T and the National Cybersecurity Alliance
  • 12. 2017 Preview: Third Parties A chain is only as strong as its weakest link! That means it’s no longer enough for an organization to secure its own system — it’s imperative to make sure the third-party vendors that have access to operations and data are properly secured as well. The recent Wendy’s attack was actually coordinated not on Wendy’s itself, but through a malware attack on the fast food chain’s point-of-sale system. Attacks like this are expected to grow in frequency. More reading: “The Challenges of Third-Party Risk Management,” NetworkWorld
  • 13. 2017 Preview: People A recent report says that more than 200,000 cybersecurity positions are currently unfilled in the U.S., and that demand for cybersecurity professionals is growing 3.5 times faster than for IT jobs as a whole, and 12 times faster than for other types of jobs. Companies might not be able to reach their important cybersecurity goals simply because they lack the right people with the right skills. More reading: “Demand to Fill Cybersecurity Jobs Booming,” Peninsula Press