Site icon Check Point Blog

Check Point’s Security Predictions for 2016

At the beginning of last year, Check Point’s top predicted security threats for 2015 included the rapid growth of unknown malware and the exploit of vulnerabilities in platforms such as Android and iOS. These predictions did come true – and they continue to remain a significant threat today. We’re nearing the end of 2015, but cybercriminals are already preparing for more attacks in 2016.

As we’ve seen from this year’s data breaches at Anthem, Harvard University, Experian, and TalkTalk, hackers are still finding creative ways to attack networks. After looking back on the cyberattacks of this year, we are anticipating the next wave of threats, hoping organizations can use this information to stay ahead of the evolving tactics of cybercriminals. Here are our top ten predictions for security threats and trends we expect to see in 2016:

 

  1. ‘Sniper’ and ‘shotgun’ malware. Hackers will not only customize malware, but they will increasingly use sophisticated phishing and social engineering tricks to gain access to sensitive data.
  2. More mobile threats on the way. There have already been multiple high-profile vulnerabilities discovered this year, and we expect that number of mobile vulnerabilities will only grow in 2016.
  3. More businesses will turn to advanced threat prevention. Traditional sandboxing will no longer protect against the growing malware landscape. CPU-level sandboxing will become more common as it is the only advanced solution that can detect and protect against evasive, unknown malware and zero-day attacks.
  4. Critical infrastructures will be highly targeted. SCADA and ICS networks were not designed for security. Attacks against these systems have increased in recent years, and we expect this trend to only get worse.
  5. IoT and smart devices are still at risk. The Internet of Things will continue to emerge, and businesses will need to think about how to protect their smart devices and prepare for the wider adoption of IoT.
  6. Wearables won’t be safe, either. Wearables like smartwatches will make their way into the enterprise, but this will also introduce new security risks and challenges as wearables can be hacked to capture video or record audio.
  7. Trains, planes, and automobiles. In 2015, we saw the beginning of car hacking. Modern cars are featuring more gadgetry and connected systems, and this will make vehicles just as vulnerable to today’s threats and attacks.
  8. Real security for virtual environments. Organizations are moving to virtualized environments, which are complex and create network layers that can become an attack vector. Virtual environments will require new approaches to network security.
  9. New environments will bring new threats. New operating systems such as Windows 10 and iOS 9 were launched this year. Hackers will take advantage of attacking these new operating systems because updates are more frequent and users are less familiar with the environments.
  10. Organizations will look to security consolidation. To protect against advanced threats, security professionals will increase their reliance on centralized security management solutions. Consolidating security provides an effective way to cut complexity and make for easier management.
Exit mobile version