Top cybersecurity predictions of 2015

What cybersecurity trends can we expect to see in the coming year?
1 of 10 Charlie Osborne/ZDNet

Healthcare at risk?

As noted by Websense, healthcare data is valuable. Not only are companies such as Google, Samsung and Apple tapping into the industry, but the sector itself is becoming more reliant on electronic records and data analysis. As such, data stealing campaigns targeting hospitals and health institutions are likely to increase in the coming year. 

2 of 10 CNET

New players on the global cyberthreat field

We have continual spats between the United States and China — each country accusing the other of state-sponsored cyberattacks — a flow of cybercrime reports from industry experts and a rising digital presence in countries like Russia, and so it is safe to assume we'll see more of the same in 2015. Cyber espionage can be lucrative where sensitive, corporate or government data is concerned, and when we live in a world where teenagers can break into these networks for the fun of it, the lure of valuable data will likely beckon new players to the field.  

3 of 10 Charlie Osborne/ZDNet

New vulnerabilities

Heartbleed, OpenSSL flaws and the Shellshock bash bug are some of the main headliners this year in exploits and security flaws, and we are likely to see more revealed over the coming year. Why? Many systems used by governments and businesses are based on open-source code, which is cheaper to implement than starting from scratch. Should flaws exist, in conjunction with these valuable networks, exploits to take advantage of such weakness will eventually appear.

4 of 10 Charlie Osborne/ZDNet

Information, also known as a digital goldmine

Information is the new currency — or, at least, can be turned to profit by credit card thieves. ATMs compromised with gadgets that steal card data, cameras that capture your PIN — these are today's dangers, and can be far more damaging than a stolen handbag or wallet. Cards can be cloned or unauthorized purchases made through these methods, and data may also find its way on to the black market. Next year, it is possible that credit card thieves will start turning their attention to a wider range of personal data to capitalize on.

See also: 15 tips for staying safe online and preventing identity theft

5 of 10 Charlie Osborne/ZDNet

Internet of Things exposed

The idea of the internet of things (IoT), networked and connected devices, is slowly emerging in the consumer market. Gadgets like smart coffee machines, cars and Google's smart Nest thermostat are only the tip of the iceberg, but unfortunately once you connect a device to the Internet, you make it vulnerable to attack. In 2015, as IoT expands, we are likely to see an increase in cyberattacks levied against these products.

6 of 10 CNET

Enterprise encryption

Most businesses won't hit the profit margins to do more than other industry players when it comes to security. The general level of security in networking improves when risk management demands it, but in the following year, we are likely to see funds diverted to bolster policies regarding encryption — as consumers now demand higher levels following events such as the disclosures of former NSA contractor Edward Snowden and worries over increased surveillance. 

Top-level players such as Google and Apple have begun this trend — and others are likely to follow. 

7 of 10 Charlie Osborne/ZDNet

Email threats increase in sophistication

Email-based phishing campaigns have evolved from long-lost uncles in far-away countries to users apparently winning the Spanish lottery or faked requests from PayPal to check transactions, and we're likely to see a continued evolution of these campaigns to become even more sophisticated and enticing. 

8 of 10 Verne Global

Insider threats

A network is only secure as its weakest link — and in the world of cybersecurity, this is most often the human element. Sometimes, networks are breached by human error, but insider threats remain — and will continue to be — a growing problem. Technology evolves, and mistakes are made — and money is often there for the taking to compromise a company's system from the inside. 

9 of 10 CNET

Mobile concerns

With the expansion of mobile device use, apps that gather data and increased connectivity, it is likely that mobile threats — such as malware and phishing campaigns — will be refined to seek more ways to steal credentials or authentication details. Mobile devices will likely become popular access points that increasingly seek to compromise cloud-based applications, especially in the corporate realm thanks to bring-your-own-device policies.

10 of 10 Verne Global

Next generation datacenters

As corporate demand for data and information storage and analysis grows, so does the datacenter industry. It often makes sense for businesses to utilize these centers to safely store and manage their computer equipment, and over next year, we are likely to see the beginnings of change in data center design — building strong security within the original framework, rather than retrofitting.

See also: A tour of Iceland's data centers

Read on: In the world of security

-Sony Pictures corporate files stolen and released in cyberattack
-Amnesty's Detekt tool wants to help you thwart government spying
-Snapchat issues outright ban on third-party apps following 4chan hack
-Hackers infiltrate White House network
-Teen hackers charged with stealing $100 million in Army, Microsoft tech
-Analysis casts doubt on FBI claims over Tor website seizures
-High volume DDoS attacks rise in Q3 2014
-Apple iOS Masque flaw dangers: Communication app infiltration discovered
-UK hires hackers, convicts to defend corporate networks

Related Galleries

Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup
Person seated at a booth in a cafe looks at their phone and laptop.

Related Galleries

Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup

10 Photos
Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup

Related Galleries

Tech salaries, developer skills, cybersecurity, and more: ZDNet's research roundup

8 Photos
Yubikey Security Key C NFC
Security Key C NFC

Related Galleries

Yubikey Security Key C NFC

8 Photos
First look at the YubiKey Bio
YubiKey Bio

Related Galleries

First look at the YubiKey Bio

10 Photos
iVerify (version 17)
iVerify for iOS and iPadOS

Related Galleries

iVerify (version 17)

5 Photos
OnlyKey hardware security key

Related Galleries

OnlyKey hardware security key

19 Photos
SoloKeys Solo V2
Solo V2

Related Galleries

SoloKeys Solo V2

10 Photos