This week, as the World Economic Forum (WEF) met in Davos, Switzerland, cybersecurity took a key spot on the agenda. The World Economic Forum announced plans Wednesday for a new Global Centre for Cybersecurity. “The new Global Centre for Cybersecurity is designed as the first platform to tackle today’s cyber risks in a truly global manner,” Alois Zwinggi, managing director for the WEF, told CyberScoop. The new group is intended to facilitate increased public-private collaboration and information sharing on cyber threats. “Only through collaboration, information exchange and common standards can the global community successfully counter organized digital crime,” said a press release from the organization.
2016 is a new frontier for cybersecurity, but based on what happened in 2015, it’s safe to say that past incidents will continue this year. Here are four cybersecurity trends we expect to see in 2016:
The Growing Threat of Ransomware
Ransomware encrypts data on user machines to prevent access until the user pays to release the encryption. In other words, ransomware holds user data hostage and demands a ransom to free it. These attacks are becoming more and more common, even extorting money from police departments. Ransomware can affect both ordinary computers and phones—and it won’t be long until Internet of Things devices face the same alarming consequences.
The start of a new year provides an opportunity for organizations to review their operations—and strengthen digital security wherever it is lacking. Evidence suggests more hacking scandals will occur in 2016, and since no business wants to be the next headline-making hack victim, strong cyber defenses are a must. Here is a checklist of three cybersecurity tools IT teams should have in order to protect their computer assets this year.
Businesses process large amounts of sensitive data—customer credit card numbers, employee payroll information, trade secrets, and much more—making them targets for criminals. The safer the information storage, the better protected firms are from both cyber and physical compromises. Here are four ways to improve the storage of sensitive data: