IT disaster recovery, cloud computing and information security news

2016’s top information security threats

Troy Gill, has analysed threat trends over the last 12 months and offers his perspective of what lies ahead...

Evolving malware

More sophisticated malware will continue to defeat detection by hiding in common services and using non-traditional forms of communication such as TOR or peer to peer.

In tandem, recent highly effective social engineering ploys, such as those utilised in ransomware, will continue to terrorise businesses.

For all malware infections, prevention is definitely better than cure although, I personally don’t see a means to impeding infections 100 percent of the time. However, you can shrink the attack surface significantly by the following:

  • Keep operating systems and software updated;
  • Install robust security defences such as firewalls, IDS, spam and virus filtering and web filtering;
  • Perform regular security awareness training to identify attacks;
  • Always back up your data so if you do fall victim, you can simply restore your files.

When it comes to ransomware, victims continue to payoff these cyber criminals and, in turn, the bad guys keep doing what’s working so well for them. As long as they’re being paid, these crafty cybercriminals will continue to innovate new attacks that will push the needle. Remember the attackers are agile and often take advantage of zero-day vulnerabilities and we can only attempt to harden against these. Unfortunately, there is no easy way to defeat ransomware but paying the ransom is, in my opinion, ill-advised and also there’s no guarantee that you’ll even get the keys to unlock your data.

Breach tsunami

The bevy of breaches that occurred during 2015, and the abundance of credit card and other personal information obtained from them, will lead to an increase in spear-phishing and other more targeted attacks.
The veritable treasure trove of private personal information that exists on the cyber underground, coupled with further information gleaned from social media, means criminals can generate highly targeted attacks or used as convincers in fraudulent transactions.

Cyber warfare

Acts of cyber aggression will continue amongst many nation states including the US and China, as well as remain a tool of warring nations. While we may not be privy to the majority of these attacks against infrastructure or corporate espionage between our collective countries, evidence suggests that the Internet has become an important tool in every aspect of our lives including war and politics. Expect this ‘boots at home’ tactic to remain in the playbook as a first move in most conflicts whether it be just reconnaissance or even the disabling of infrastructures and communications.

Internet of Things

Practically every business and even some individuals will have Wi-Fi enabled fixed devices that are controlled remotely: from switching on lights at home to cooling nuclear reactors in power plants. When vulnerabilities exist in any popular OS, and hackers know about them, it is only a matter of time before they are exploited. The issue is that people are not installing security patches in a timely manner, and inadvertently leaving their devices vulnerable. 

Bring your own device (BYOD)

No threat list would be complete without referencing this threat. BYOD often provides the business with cost savings and increased productivity/effectiveness from their workforce.  However, the security challenge that this movement has created has also left IT departments in a bit of a quandary.

Organizations need to have a BYOD strategy and policy that is appropriate to their situation. Obvious security points to address with the policy include: password enforcement; encryption; device management; access control, etc. should all be kept in mind while still maintaining enough freedom to keep the employee happy.

Striking that balance is important to keeping the organization more secure and at the same time, empowering employees.  Of course, that’s often easier said than done as organizations need to properly enforce the policy - something that presents a challenge in its own right.  Security training that includes reminders about safe browsing and identifying suspicious links wouldn’t go amiss.


Often referred to as the ‘Dark’ or ‘Deep’ Web, TOR continues to attract both the good and bad of society, lured by its promise of anonymity. Facebook’s new experimental move into the TOR network may inspire other reputable services to want to provide anonymous access thereby enticing new users who may have been unwilling to try them beforehand.

While there are legitimate reasons visitors may require secrecy, a great many illegal things have also been discovered on Tor’s network: items that should be protected by fair trade, copyright and other laws; stolen credit card forums; general hacking services and malware creation. Even the groups behind ransomware, such as CryptoLocker, have begun to demand their ransoms through the TOR network utilizing CryptoCurrency like BitCoin to remain anonymous to authorities and their victims.

It is important to be aware of all of the different ways that Tor can be used and make any necessary adjustments. If this is something that concerns you as a business owner then policy should be put into place that restricts the installation of Tor software.  And remember, it always pays to be vigilant.  No matter what the circumstance.     

Unexposed vulnerabilities

The past few years showed some major issues with secure communication - like that in SSL as leveraged by Heartbleed, and a long time bug in Bash with Shellshock. The discovery of vulnerabilities such as these will continue to be a major goal for attackers and defenders alike.

Mobile payment systems

Vendors have been trying hard to change the way we make transactions with features such as Near Field Communication and virtual wallets in mobile devices. Unfortunately, its early adoption has left a lot to be desired thanks to security issues and concerns.

Thanks also to these early flaws, and the attack on the CurrentC payment system through third parties which led to the leak of the email addresses of early adopters, we can expect mobile payment systems and its architectures as a highly likely target of attack. Hopefully the organizations concerned will work aggressively to make digital payments through services such as ApplePay, Google Wallet and CurrentC much more secure.

Individual cloud storage

The use of Dropbox, OneDrive, Box, Google Drive as well as all of the other cloud storage services by individuals as a means to more easily access documents in multiple locations will pose a greater risk to personal as well as professional targets as company documents and data co-mingle with personal files in the cloud.

It’s also worth noting that using cloud storage for data backup does not automatically negate the risk from Ransomware – in fact MANY previous Ransomware attacks (aka Cryptolocker) have relied on free cloud storage sites like Dropbox to distribute their payload.

Organizations need to limit access to folders within their cloud network to only the individuals that need access to perform their job role.  This will help prevent both accidental and purposeful data loss.
Carefully select which devices employees are permitted to use when accessing the cloud, and what types of encryption to use to keep the devices from connecting to unsafe networks.

As mentioned previously, another helpful practice is maintaining regular security training so users know the risks. This will help those who otherwise may inadvertently expose sensitive company data by keeping them on course with best practices.

Staying Safe in 2016

While the above threats are expected to dominate 2016, this list is in no means exhaustive. Sophisticated attacks will continue to be problematic and perhaps even more difficult to detect. To help, here is a summary of best practice tips:

  • Educate users on current threats in the digital landscape, including phishing campaigns, malware and malicious websites;
  • Introduce layered security - adopting a layered security approach is the best way to ensure your business is covered from all angles. While protecting your business from viruses via email filtering is a great start, it doesn’t protect your business from malware threats on the Web and vice versa, so …
  • Shielding your business from as many vulnerabilities to your network as possible is essential to staying ahead of hackers.
  • Don’t skip software and firmware updates; these often contain security patches for vulnerabilities. The longer you go without updating your software, the more susceptible your network is to malware.
  • If any of your software or hardware has reached its end-of-life, meaning the manufacturer will no longer support it or make security patches, it’s time for an upgrade. While it may seem expensive on the front end, it can save you from lost labour, costly fines and lawsuits on the backend.

Of course, there is no silver bullet when it comes to online threats. However, with a blended security approach that leverages current intelligence and technology from several sources, combined with regular security training, organizations can prevent most malware from entering their network and deflect threats that might otherwise damage systems.

The author

Troy Gill is AppRiver’s manager of security research.

Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.