BLOG

  • LinkedIn

The 2016 Threat Landscape

By: Darin Barton CISSP, CISA

Threat_Landscape_1

The I.T. threat landscape is rapidly changing and few are immune to its effects.  We expect a significant rise in the complexity of malware and targeted attacks in 2016.  The question is:  Will you be ready?


In 2016 we believe there are four vulnerability zones to be acutely aware of:

  • Targeted Attacks
  • Social Engineering
  • Encrypted Traffic Inspection and Analysis
  • Virtualized System Security

Throughout 2015 we’ve seen high profile attacks expose millions of customer records as the criminal element gets more savvy, bold and daring with their attacks.  The attacks are getting very complex, not just technologically but sociologically, that even the most sophisticated I.T. staffer could be fooled by a targeted attack.

In 2016, there will be renewed focus by cyber criminals on enhancing their methods of attack through encryption vectors. Gartner reports that only 20% of organizations are inspecting encrypted traffic which means 80% of organizations are vulnerable.  Google, and other browser engines, are giving preferred search result ratings to SSL/TLS sites and a majority of social sites being visited by staff on a daily basis are now HTTPS .  The result; if your security doesn’t include the ability to inspect SSL/TLS traffic then malware will make its way onto your endpoints.

We have also seen an increased attack focus on virtualized systems where East-West traffic is rarely scanned, logged or controlled resulting in increased infection rates.  Companies are placing their “data eggs” in a single basket which make it an attractive attack vector to focus on.  With the introduction of SDN (Software Defined Networking) it will be more important than ever to invest in securing your virtualized systems and networks.

If cyber criminals are not trying to cause disruption or steal your data then they are encrypting it for ransom.  And Yes! The ransoms are getting paid and they are successfully getting away with it.  Be vigilant in 2016, the landscape is changing and being prepared is your best defense against the prevailing threats.

What’s Your 2016 focus?:

  • SSL Inspection:  Identify and deploy methods to inspect SSL & TLS traffic
  • Sandboxing & Malware Threat Discovery:  Deep-inspection of all traffic for malicious or abnormal activity
  • Security Awareness Training:  Train your staff to be vigilant and IT security aware
  • Virtualization Security – Server & Desktop:  Protect against transient & malicious  East/West traffic

:Darin Barton CISSP, CISA is a senior security professional in Toronto Canada, with 20+ years experience in cybersecurity and investigations and currently employed with Access 2 Networks Inc. (A2N).