Top 5 Cybersecurity Trends of 2016

Michael Ritter
hooded figure

In 2015, several high-profile data breaches made cybersecurity a major talking point. As the companies involved still try to repair the damage to their businesses, the key question is what lies ahead in 2016. Cybercriminals aren’t going anywhere and, with more and more data moving to the cloud, network security will continue to be a key concern. Here are some thoughts on what security trends we can expect to see next year:

1.    Cybercriminals Will Be Just as Busy

Unfortunately, communication networks are an increasingly attractive hunting ground for criminals, activists and terrorists motivated to make money, get noticed, or even bring down corporations and governments through online disruption. Several high-profile hacking incidents made the news in 2015. We should brace ourselves for more cyberattacks in the new year.

2.    There’ll Be More Data Protection Regulation

Most governments have already created, or are in the process of creating, regulations that impose conditions on how private information has to be used and safeguarded. Of course, that’s going to mean that any organization failing to sufficiently protect data could be hit with stiff penalties. The new EU data protection framework is one of the new directives set to be completed in 2016.

3.    Using More Third-Party Providers Will Create Its Own Risks

The cloud has become a vital component of every organization's international business operations and today's global economy. A range of valuable and sensitive information is increasingly being shared with third-party cloud service providers. The problem is that, when that information is shared, direct control is lost. Carefully vetting third-party vendors and continuously monitoring compliance will be important risk management strategies in the coming months.

4.    More Organizations Will Take a Proactive Approach to Data Protection

With the trend toward outsourcing and cloud-based IT applications, there will be a natural shift toward a more proactive strategy for cybersecurity. Encrypting data in motion when it leaves an organization’s perimeter is becoming a vital component of keeping critical information safe from cyberattacks. Growing awareness, as well as new rules and directives, will trigger many more firms to implement robust security controls, such as safeguarding data at rest and in motion, and encrypting at the lowest network layers.

5.    Encrypted WAN Connections Will Become Standard

Whatever trust enterprises once had in the security of WAN connections from service providers is long gone. Recent exposure of surveillance by government intelligence agencies shows that they can no longer be relied on automatically. WAN connections should be encrypted and this trend will also find its way into the portfolio of service providers in 2016.

Related articles