6 Projected Cybersecurity Threats in 2016 – Part 2

In the first part of this series we wrote about three cyber security threats that are expected to be a plague on 2016 – cloud security, mobile security, and automobile security. We are back this month with three more cybersecurity threats that need to be on your radar:

Phishing Attacks

Phishing attacks aim to trick users into thinking they are dealing with a reputable entity in order to steal passwords and other sensitive information. For instance, a user may think that he is corresponding with his bank and inadvertently give account logins to a hacker who plans to empty their account. These attacks have proven very effective in the past because they trick users without raising any red flags. Most people don’t realize they have been compromised until after the damage has been done. Expect these attacks to become both more frequent and more effective as phishing strategies grow in sophistication.

Medical Security

As part of the rapid evolution of the “Internet of Things,” advanced medical devices are now commonly connected to the Internet. This is exciting for both doctors and patients because it enables essential health information to stream in real-time over long distances. But at the same time, this connectivity makes these devices vulnerable to cyber criminals. There is the very real risk that malicious entities could access these devices and steal sensitive medical information. Worse still, some have suggested that hackers could take over devices like a pacemaker or insulin pump and force the patient to pay a ransom or risk having the device disabled. So far no instances of this have been reported, but the very possibility points to a chilling future.

EMV Chips

In order to mitigate the instances of credit card fraud, the major providers are now creating cards with an embedded EMV chip. This chip replaces the traditional magnetic strip and makes it almost impossible to counterfeit the card. That is good news for consumers, but some security experts have predicted that the change will only spur on cyber crime elsewhere. For instance, while it will be much harder to use a counterfeit card in a brick and mortar store, it will still be possible online. And in every country where cards with EMV chips have become the norm, online fraud has increased. Rather than reducing crime overall, these chips may simply direct it elsewhere.

Each one of these threats highlights the willingness of hackers to evolve the technologies and strategies they use to respond to changes in the technological landscape. That means you need to evolve as well. If your staff lacks the cybersecurity expertise that it requires, partner with the staffing solutions providers at The Squires Group.


Leave a Reply

Your email address will not be published. Required fields are marked *