About Us | Contact Us
View Cart

T7 – The Trend of Trends 2017

By Vigilize | Thursday, March 23, 2017 - Leave a Comment

The seven best trend articles in 2017 . . .


For ISO’s of small financial institutions.


ServIcons_ITAudit_01

We’ve  identified a whole new set of trend articles in Information Security that those in the field should know about, and while our take on this year’s installment is coming a little late, we think you’ll agree that there have been plenty of new developments since last year!

As we’ve said before in our previous takes on this article (Here’s the 2015 edition, and here is 2016’s), it’s important to consider when reading these pieces whether they are discussing current trends or if they’re making predictions. While both kinds of articles can be interesting to read, we try to consider them differently: by basing tactical plans on current trends, and longer term strategies based on predictions.

Whether planning or strategizing, you’ve got to start somewhere–and we think the following subjects (and articles!) are a good place to start for 2017:

  1. The Internet of Things. As common household items from thermostats to light bulbs start coming bundled with internet access the number of attack vectors for criminals has and will continue to grow at a rapid pace. Making matters worse, many of these devices lack the ability to be updated should a fatal vulnerability be discovered, and you may lose all functionality if you later decide to turn off internet access!
  2. Encryption by the bad guys. The push to encrypt everything hasn’t been lost on those wishing to do you and your business harm–the use of encryption in malware command and control channels makes detection by IDS/IPS systems more difficult, and can also prevent detection on endpoint machines as well.
  3. Cyber risk insurance. Part of your risk strategy in dealing with ransomware, reputation attacks and similar incidents should be insurance that covers some of the (potentially high) costs associated with a breach or other cyberattack.
  4. Vendor Security. Many security breaches that have made headlines as of late started due to poor vendor security–from card readers to secure messaging services, very few organizations can afford to do everything in-house, and the risks presented by a vendor may not always be obvious at first.
  5. Cloud Security. As adoption of cloud storage continues to climb, it’s more important than ever to have a good strategy when it comes to the risk such services may expose you and your organization to.
  6. More advanced and targeted phishing attacks. No, phishing attacks aren’t going away any time soon–far from it, they’re actually increasing dramatically in their complexity and how their targets are being chosen! Now if you or an employee accidentally get hit by a phishing email it’s almost certain to contain ransomware, which as we covered in #2 is also a burgeoning field.
  7. Reusing passwords coming back to haunt you. With more sites and services demanding more out of your passwords (letters, numbers, special characters and other requirements abound) it has never been more tempting to reuse that one “good” password you’ve memorized–and the bad guys are counting on you to do that!

 


This article is now a collaboration of several infotex team members.  Original T-7 article concept by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex

Dan’s New Leaf is a fun blog to inspire thought in the area of IT Governance.


same_strip_012513


 

Latest News
    Welcome Cybersecurity Conference Attendees! Thanks for joining us for the Cybersecurity Conference today! We have created this page for you to have access to the deliverables from Dan’s talk.  
    What you need to know for compliance coast-to-coast. Back in 2020 we posted an article containing links to data breach laws from each state, and it has proven to be one of our more popular posts.  Because laws surrounding the use (and abuse) of technology are always evolving, we thought it was worth taking another […]
    Why It Rhymes With SEEM (And its Not the I Before E Rule) Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . It’s the Gestalt. The idea that the whole is greater than the sum of it’s parts. That’s not something that is often brought […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    Questions about China’s new disclosure laws only highlight the uncertainty about disclosure in general… An article review. China recently made waves in the security world by announcing a new set of data security laws, one of which has added new fuel to a long running debate: how and when should security vulnerabilities be disclosed…and to […]
    Four Conditions … …For Why a Network Can be Anything But a Network! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . I have to admit that infotex is being called into engineering meetings with larger organizations these days that are NOT community based banks.  We […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]
    If Zero days need Zero clicks, are there any secure devices in the mix? Tanvee Dhir explores the Pegasus spyware. Another technical post, meant to inspire thought about IT Governance . . . . Introduction Over the past couple of weeks, we have seen multiple stories regarding a powerful piece of spyware called Pegasus sold […]
    Our Lead Non-Technical Auditor takes a look at the new AIO Guidance… Architecture, Infrastructure, and Operations (AIO) is the latest booklet released by the Federal Financial Institutions Examination Council (FFIEC) in their line of  IT Examination Handbooks. It is an update to their 2004 Operations booklet and, as the name implies, expands into the areas […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office. Interested in one of ours […]