Unfortunately, 2014 was another challenging year for IT security professionals casting a dark shadow on cyber security predictions for 2015. In January everyone was still reeling from the Target breach, but as 2014 dawned there were immediately breaches announced that--like Target--were so large the figures were difficult to comprehend. P. F. Chang’s and Neiman Marcus had been victimized by hackers in 2013 too, though this wasn’t revealed until 2014. Then there was the roll call of new breaches: Home Depot, and Michael’s, and JP Morgan … and each of these breaches compromised the personal information of millions of customers. And these were just the huge hack jobs—there were many, many smaller breaches, such as the attack on the US Postal Service that compromised the data of 800,000 employees.
Things are hotting up on the international hacking front, a fact underlined by the most recent Sony data breach. Following the data breach carried out by a group called Guardians of Peace, the movie “The Interview,” scheduled for Christmas release was pulled. This was due to pressure from various sources including political. Many sources believe the attack may have been a state-sponsored attack provoked by the content of the film which involves the death of a parodied version of Kim Jong-Un, the supreme leader of the Democratic People's Republic of Korea.
International cyber hacking will be in the news again in 2015. It’s been suspected for years that the next battleground between nations would be cyberspace, and it seems very likely that international incidents are going to escalate. There are issues that the cyber community hasn’t thoroughly addressed—how do you deal with malware when a government is the source?
As an IT professional, you need to know what threats you’ll face in 2015 and how to defend against them. Based on analysis from cyber attacks in 2014, here are the top network security threats we believe you will face in 2015.
It’s going to be more important than ever in 2015 to keep all network security solutions up to date, ensuring robust protection is in place and optimized, and to have a company security practices in place that are continually updated and refined in order to stay ahead of targeted attacks.
Sign-up for email updates...