Towerwall's InfoSec Blog

Content Type

See all
5 cybersecurity trends to watch for in 2016

5 cybersecurity trends to watch for in 2016

Phishing , malware , ransomware , Internet of Things , cloud services , Known vulnerabilities , cannabis , Enterprise

Michelle Drolet

As threats evolve and grow more sophisticated, securing IT systems is more important than ever. We may welcome in the New Year with open arms, but we must also prepare for the cybersecurity threats ahead of us. The 2015 Cost of Data Breach Study from IBM and the Ponemon Institute put the average cost of a data breach at $3.79 million, and that figure is expected to grow in the year ahead. With the right resolutions, you can drastically reduce your chances of falling prey to cybercriminals.

5 Information Security Trends for 2016

DRIDEX botnet , Darkode , China hack , EMV credit cards , SIMDA botnet , Application Security , Google Wallet , mobile malware , ransomware , Internet of Things , smart-connected , RFID credit cards , IoT , cannabis , EU Data Protection , Enterprise , Apple Pay

Michelle Drolet

Online security trends continue to evolve. This year, online extortion will become more prevalent. We also expect that at least one consumer-grade IoT smart device failure will be lethal. Ransomware will make further inroads, since the majority go unreported. China will drive mobile malware growth to 20M, and cybercrime legislation will take a significant step towards becoming a truly global movement. Here are five information security trends on track for the New Year:

Known vulnerabilities pose biggest IT security threats

Misconfigurations , Internet of Things , Enterprise

Michelle Drolet

Cyber risk report cites server misconfigurations as the No. 1 vulnerability. It's often said, "There's nothing new under the sun." And that appears to be the case in the world of cybersecurity where hackers most often exploit known vulnerabilities to gain access to private computer files, according to HP's 2015 Cyber Risk Report. Maintaining strong computer security, the report says, is largely a process of plugging up known holes.