Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Security Trends 2016 / 2017

Latin America. Jesús Cortina, General Manager GM Security Technologies affirms that with the changing threat environment, the policies, methodologies and technologies used to protect data become increasingly urgent; but it is essential to have certified strategic security partners.

According to the most recent studies on computer security trends 2016 – 2017, there is a triad of special cases that promise to continue giving something to talk about during the next year. It is worth noting that the figures point to 80% of professional cybercriminals and those belonging to organized criminal gangs.

Among the trends is advanced malware, exposed as a commonly used file, which usually features the extension of documents, PDF, Excel, Word or JPG images. This file proliferates easily because its use is common, in addition to being present in the most used chat applications, especially for sharing documents.  In general, it takes a long time to detect the damage caused, but it can be identified with an antivirus or simply by ignoring the e-mail that has the dubious file; for which it is necessary to always maintain user education campaigns. Even so, it is difficult to handle it because they are designed in a way that crosses a large number of safety barriers.

Another trend is the risk to which privileged users in companies are exposed, that is, 20%. All those employees who handle passwords of emails, files or sensitive data of organizations, represent risk, given bad digital practices, as well as the little confidentiality in terms of the keys.

- Publicidad -

Also, ransomware, that crime typified by online extortion that encrypts all the data of a company, and that requires a "reward" collection, so as not to be sold or made public knowledge. This trend, even though it only accounts for 10% of attacks in the region, is becoming a very thriving business for cybercriminals. This type also includes reputational crimes, or any theft of information that may incriminate a person in a compromising or criminal situation.

Safeguarding data, a titanic task
Cyber extortion emerged as a strong trend in 2015, in fact it was the year of ransomware; but in 2016 there have been many varieties in which cybercriminals have taken advantage of breaches to commit crimes. It has definitely been the year of cyber-extortion using more and more, the threat of distributed denial-of-service (DDoS) attacks and the threat of exposing sensitive or even reputational business data, intellectual property and information related to legal cases or mergers and acquisitions. In fact, malware as a service has become a business model in the hands of organized professionals, reaching the hacking of corporate databases.

Additionally,  exploit kits, common vehicles for the latest malware, which need outdated software to carry out security holes; although they continue to occur, they are becoming less and less usual, due to the elimination by support, by software manufacturers, as well as self-updating, without the need for user intervention.

In this order of ideas, a return to old malware schemes based on email attachments, such as macro malware, is foreseen, implanting malicious code to documents contained in such attachments. Also, as third-party add-ons are removed, a greater emphasis is expected on the use of browsers as a way to infect computers.

Santiago Jaramillo
Author: Santiago Jaramillo
Editor
Comunicador social y periodista con más de 15 años de trayectoria en medios digitales e impresos, Santiago Jaramillo fue Editor de la revista "Ventas de Seguridad" entre 2013 y 2019.

No thoughts on “Security Trends 2016 / 2017”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter