Top 5 Cybersecurity Challenges Of 2018

by Moumita Deb Choudhury    Dec 22, 2017

cyber attack

The year 2017 could be termed as the ghastliest in cybercrime history. For sure, names of Wannycry, Petya or Not Petya, Locky still give shivers to those who worked endlessly to resolve when the infliction befell. While cybersecurity experts are strengthening the security fortress by making technology robust, cybercriminals are devising new ways to puncture and breakthrough. With this ever-raging war with the smartest cyber miscreants, what security challenges might 2018 hold, check it out.

Threat on the cloud:

Cyber attackers will follow organizations into the cloud, companies will capitalize on automation to remedy the skills shortage, cryptocurrencies will face greater threats and nation-state activities will increase predicts cybersecurity company FireEye. Here are FireEye’s security predictions for 2018. The report touches on an array of issues the company believes are likely to change our world in the year ahead.

“This past year was something of a turning point for public cloud adoption. In 2018, I think the floodgates are really going to open as organizations see and feel the lower costs for running in cloud, and that they can move more quickly. That means attackers are going to follow that data into the cloud, regardless of what the data is – be it credit cards or medical records or something else,” said Martin Holste, Chief Technology Officer for Cloud, FireEye.

A Shortage of Skilled Workers Paves the Way for Automation

Attacks will continue to be effective through an increase in sophistication, but they will also be successful due to the challenges organizations face in recruiting and retaining skilled cyber professionals. With no foreseeable end to this skills shortage as 2018 approaches, the security industry will likely begin to see more automation, machine learning, and artificial intelligence used to combat cyber attacks.

The most sophisticated organizations have automated intelligence sharing, and are putting those intelligence feeds directly into security controls without a human ever touching a keyboard. FireEye expects this type of automation to spread next year, increasing preventative controls and decreasing the time to detect attacks.

The Rise of Cryptocurrency Hacks

As cryptocurrencies grow in importance, including as a method of extracting revenue from cybercrime, Forcepoint predicts that the systems surrounding such currencies will increasingly come under attack. Attackers will target vulnerabilities in systems which implement blockchain technology.

Moving into 2018 there will be much more malware actively stealing cryptocurrency from weakly protected wallets, shimming password entry to wallets, stealing offline wallets for brute forcing, or using credentials stolen from the same user.

Disruption of Things: It’s Going to Happen

The wide-scale adoption of IoT devices in consumer and business environments, coupled with these devices often being both easy to access and unmonitored, has made them an attractive target for cybercriminals wishing to hold them ransom or obtain a long-term, persistent presence on the network. While ransomware of these connected things is possible, it remains unlikely in 2018. However, a new threat that will emerge in 2018 is the disruption of things. As the IoT offers access to both disruptive possibilities and massive amounts of critical data, we will see attacks in this area, and may also see the integration of a man-in-the-middle (MITM) attack.

Shift your focus from protection and prevention:

 “Take the money you’re spending on prevention and begin to drive it more equitably to detection and response,” said Earl Perkins, research vice president, Gartner. “The truth is that you won’t be able to stop every threat and you need to get over it.”

According to Gartner, a dedicated, well-financed actor who is after something in your enterprise is going to get it, even if they use the weakest link– people–to do so. This means adapting your security setup to focus on detection, response, and remediation. That’s where the cybersecurity fight is today. In the future it will most likely move to prediction of what’s coming before anything happens.