About Us | Contact Us
View Cart

T7 – The Trend of Trends 2016

By Dan Hadaway | Wednesday, April 6, 2016 - Leave a Comment

The seven best trend articles in 2016 . . .

But these seven are worth the read!
Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . .

ServIcons_ITAudit_01Each new year brings with it a new set of trends that Information Security Officers should be aware of, and although I’ve procrastinated a little in bringing you this year’s installment I hope you’ll agree it was worth the wait–there have been plenty of exciting developments in technology since I last visited this subject!

As I said in my look at trends for 2015 it’s important to consider whether such “looking forward” pieces are discussing current trends or if they’re making predictions. While both articles on trends and ones on predictions make for interesting reading, I consider the two in different ways: by making plans based on current trends, and strategizing based on predictions.

Before you can plan or strategize, though, you need to know where to start and I think the following seven subjects are worth considering as we make our way through 2016:

  1. Wearable Tech. As we noted earlier this year, the launch of the Apple watch has put wearable tech–and the potential security risk posed by it–in the forefront. Because progress will inevitably make these products inexpensive and ubiquitous this is certainly a subject you will have to have to visit at some point!
  2. Open source vulnerabilities. One of the draws of open source software is the idea that because the code is open for scrutiny by any interested parties that vulnerabilities are more likely to be exposed–and fixed–quickly. A number of incidents in 2014 and 2015 have tested this theory, however.
  3. Encryption: Privacy vs. Security. Even before the FBI iPhone encryption story got people talking this was a hotly debated subject, with plenty of convincing arguments on the side of the government and private citizens. With the recent attacks in Brussels still fresh on everyone’s minds this will undoubtedly be an issue that won’t be laid to rest any time soon.
  4. Threat Intelligence Sharing. Speaking of threats (and the ability to see them coming), we’re seeing moves toward the open sharing of threat intelligence among security firms. Many experts believe openness is more important than keeping such information proprietary, since one compromised system can easily create havoc for you even if you’ve done everything right.
  5. Ransomware. Those of you who remember Cryptolocker won’t be too happy to learn that it was just the start of what looks to be a new trend in hacking: viruses that hold your data hostage until a ransom is paid. With both the BBC and New York Times recently used as vectors for the malware through their advertising networks this is not a subject that only applies to a niche audience.
  6. Mobile Malware. If Cryptolocker and other ransomware wasn’t enough, hackers are becoming increasingly savvy when it comes to targeting your smartphone. Even the iPhone–long considered to be free from such attacks–has joined the ranks of systems with threats known to be circulating in the wild.
  7. Last but not least we’ve got some self-promotion with my Magnificent Seven for 2016. The return of this yearly article is a blend of trends and predictions, to go back to the point I made at the start of this article: it’s what I think Information Security Officers should be considering right now as they  plan for the rest of the year.

Original article by Dan Hadaway CRISC CISA CISM. Founder and Managing Partner, infotex

“Dan’s New Leaf” is a “fun blog to inspire thought in the area of IT Governance.”


Latest News

    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape)   You are welcome to print out and distribute this around your office.  

    Intelligence agencies from five nations contributed to the new advisory… An article review. For the first time, the cybersecurity divisions of the nations in the “Five Eyes” alliance (The United States, United Kingdom, Canada, Australia and New Zealand) have released a joint advisory concerning incident response. The report, available here, does not provide a complete […]

    PRESS RELEASE – FOR IMMEDIATE RELEASE BUSINESS NEWS NEW EMPLOYEE FOR INFOTEX infotex has just hired Nathan Harrell, to be a new Engagement Coordinator to assist with all communications between both current and prospective Clients. “We’re really excited to have Nate joining the team to help us keep the channels of communication open!” says Bryan […]

    A Webinar-Movie Short Back by popular demand! Our Board Awareness Training program continues with this movie, entitled Vulnerability Management for Directors, that can be presented directly to your board of directors.

    Nearly half of all companies expect a security issue due to telecommuting… An article review. A few months ago we discussed a warning from the Department of Homeland Security regarding hackers taking advantage of the business disruptions caused by COVID-19, and according to an article shared with us by our friend Wes Pollard it appears […]