/>
X

Top cybersecurity predictions of 2015

What cybersecurity trends can we expect to see in the coming year?
charlie-osborne.jpg
71.jpg
1 of 10 Charlie Osborne/ZDNet

Healthcare at risk?

As noted by Websense, healthcare data is valuable. Not only are companies such as Google, Samsung and Apple tapping into the industry, but the sector itself is becoming more reliant on electronic records and data analysis. As such, data stealing campaigns targeting hospitals and health institutions are likely to increase in the coming year. 

68.jpg
2 of 10 CNET

New players on the global cyberthreat field

We have continual spats between the United States and China — each country accusing the other of state-sponsored cyberattacks — a flow of cybercrime reports from industry experts and a rising digital presence in countries like Russia, and so it is safe to assume we'll see more of the same in 2015. Cyber espionage can be lucrative where sensitive, corporate or government data is concerned, and when we live in a world where teenagers can break into these networks for the fun of it, the lure of valuable data will likely beckon new players to the field.  

73.jpg
3 of 10 Charlie Osborne/ZDNet

New vulnerabilities

Heartbleed, OpenSSL flaws and the Shellshock bash bug are some of the main headliners this year in exploits and security flaws, and we are likely to see more revealed over the coming year. Why? Many systems used by governments and businesses are based on open-source code, which is cheaper to implement than starting from scratch. Should flaws exist, in conjunction with these valuable networks, exploits to take advantage of such weakness will eventually appear.

74.jpg
4 of 10 Charlie Osborne/ZDNet

Information, also known as a digital goldmine

Information is the new currency — or, at least, can be turned to profit by credit card thieves. ATMs compromised with gadgets that steal card data, cameras that capture your PIN — these are today's dangers, and can be far more damaging than a stolen handbag or wallet. Cards can be cloned or unauthorized purchases made through these methods, and data may also find its way on to the black market. Next year, it is possible that credit card thieves will start turning their attention to a wider range of personal data to capitalize on.

See also: 15 tips for staying safe online and preventing identity theft

67.jpg
5 of 10 Charlie Osborne/ZDNet

Internet of Things exposed

The idea of the internet of things (IoT), networked and connected devices, is slowly emerging in the consumer market. Gadgets like smart coffee machines, cars and Google's smart Nest thermostat are only the tip of the iceberg, but unfortunately once you connect a device to the Internet, you make it vulnerable to attack. In 2015, as IoT expands, we are likely to see an increase in cyberattacks levied against these products.

69.jpg
6 of 10 CNET

Enterprise encryption

Most businesses won't hit the profit margins to do more than other industry players when it comes to security. The general level of security in networking improves when risk management demands it, but in the following year, we are likely to see funds diverted to bolster policies regarding encryption — as consumers now demand higher levels following events such as the disclosures of former NSA contractor Edward Snowden and worries over increased surveillance. 

Top-level players such as Google and Apple have begun this trend — and others are likely to follow. 

75.jpg
7 of 10 Charlie Osborne/ZDNet

Email threats increase in sophistication

Email-based phishing campaigns have evolved from long-lost uncles in far-away countries to users apparently winning the Spanish lottery or faked requests from PayPal to check transactions, and we're likely to see a continued evolution of these campaigns to become even more sophisticated and enticing. 

77.jpg
8 of 10 Verne Global

Insider threats

A network is only secure as its weakest link — and in the world of cybersecurity, this is most often the human element. Sometimes, networks are breached by human error, but insider threats remain — and will continue to be — a growing problem. Technology evolves, and mistakes are made — and money is often there for the taking to compromise a company's system from the inside. 

70.jpg
9 of 10 CNET

Mobile concerns

With the expansion of mobile device use, apps that gather data and increased connectivity, it is likely that mobile threats — such as malware and phishing campaigns — will be refined to seek more ways to steal credentials or authentication details. Mobile devices will likely become popular access points that increasingly seek to compromise cloud-based applications, especially in the corporate realm thanks to bring-your-own-device policies.

76.jpg
10 of 10 Verne Global

Next generation datacenters

As corporate demand for data and information storage and analysis grows, so does the datacenter industry. It often makes sense for businesses to utilize these centers to safely store and manage their computer equipment, and over next year, we are likely to see the beginnings of change in data center design — building strong security within the original framework, rather than retrofitting.

See also: A tour of Iceland's data centers

Read on: In the world of security

-Sony Pictures corporate files stolen and released in cyberattack
-Amnesty's Detekt tool wants to help you thwart government spying
-Snapchat issues outright ban on third-party apps following 4chan hack
-Hackers infiltrate White House network
-Teen hackers charged with stealing $100 million in Army, Microsoft tech
-Analysis casts doubt on FBI claims over Tor website seizures
-High volume DDoS attacks rise in Q3 2014
-Apple iOS Masque flaw dangers: Communication app infiltration discovered
-UK hires hackers, convicts to defend corporate networks

Related Galleries

Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup
shutterstock-1024665187.jpg

Related Galleries

Cybersecurity flaws, customer experiences, smartphone losses, and more: ZDNet's research roundup

8 Photos
Inside a fake $20 '16TB external M.2 SSD'
Full of promises!

Related Galleries

Inside a fake $20 '16TB external M.2 SSD'

8 Photos
Hybrid working, touchscreen MacBook hopes, cybersecurity concerns, and more: ZDNet's tech research roundup
Asian woman working at a desk in front of a computer and calculator

Related Galleries

Hybrid working, touchscreen MacBook hopes, cybersecurity concerns, and more: ZDNet's tech research roundup

8 Photos
Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup
Person seated at a booth in a cafe looks at their phone and laptop.

Related Galleries

Developer trends, zero-day risks, 5G speeds, and more: Tech research roundup

10 Photos
Drive Electric Day: A dizzying array of EVs in sunny Florida
ca3b4019-26c5-4ce0-a844-5aac39e2c34b.jpg

Related Galleries

Drive Electric Day: A dizzying array of EVs in sunny Florida

16 Photos
Incipio, Kate Spade, and Coach cases for Samsung Galaxy S22 Ultra: hands-on
s22-ultra-incipio-coach-cases-2.jpg

Related Galleries

Incipio, Kate Spade, and Coach cases for Samsung Galaxy S22 Ultra: hands-on

15 Photos
Casetify Impact Crush Galaxy S22 Ultra case hands-on: in pictures
casetify-s22-ultra-3.jpg

Related Galleries

Casetify Impact Crush Galaxy S22 Ultra case hands-on: in pictures

10 Photos