3 Digital Security Predictions for 2016


fortune teller

Digital security is a mess. An absolute mess.

This past year saw the affair-finding website Ashley Madison have their user base exposed; the second largest health insurer, Anthem, got hacked and their clients medical and personal information was stolen; and cars were hacked which allowed for the car to be remotely driven off the road and have air bags deployed. Even hackers got hacked!

What does that mean for the future?

So with all of these blunders and mess ups in mind, let’s take a look at the coming year ahead and predict what security is going to look like in 2016.

The More Things Change, the More They Stay the Same

Despite all the high profile breaches in 2015, there will still be more. Why? Because people are still following poor security practices. Back in 2014, security researchers at IBM did a study on cyber attacks. They found that 95 percent of successful hack attacks were because of human error. It doesn’t matter if the software itself continues to evolve to higher levels of security such as better encryption and compliance certifications, the people using the software are going to make mistakes.  

To put it another way: you could have the strongest and most uncrackable safe in the world, but that won’t stop an intruder if it’s left unlocked.

Yes, there have been and will be greater efforts from both governments and private organizations to secure data. For example, Google is testing the option of using your phone as an alternative to remembering your password. It’s a step in the right direction, but education is one of the strongest defenses against a hack and that is woefully lacking. Employees still open dodgy attachments, companies don’t update their systems, and people just can’t seem to stop using “123456” as a password. 

For that reason, 2016 will likely see the news dominated by reports of hack attacks.

Malware on Mobile

With over a billion Android users worldwide, it should come as no surprise that there will be lots of problems with security for mobile devices in 2016. As more businesses continue to use their mobile devices as indispensable tools for their business, they will also risk putting more sensitive company data on their phones. As mentioned above, human error is going to play significant part in this. 

However, human error with mobile devices is a little bit more forgivable because their app stores are still somewhat of a digital Wild West. Just in time for the holiday season, cyber security firms spotted that Bible and Quran apps are actually hiding malicious malware in them. It’s not the first time the Google Play store has had problems with malware and to a degree, it’s understandable that users might not be able to tell if an app is dodgy. Apple’s “walled garden” also isn’t immune to dodgy software.

XCode, the programming framework that Apple and developers use to design apps, was spoofed and used to put dodgy apps on China’s App Store. Regardless of whether it’s Apple or Android, they will be a target for hackers. Although some of this can be prevented by MDM (Mobile Device Management) software that allows for companies to monitor all phones on their network, companies in 2016 need to keep an eye on work devices and make sure that their data isn’t running the risk of being exposed.

If You Wear It, They will Hack It

Even though the Apple Watch wasn’t the game changer that lots of people expected it to be, it still was an accurate reflection of the coming future of wearables. These (often) little devices are a treasure trove of sensitive data. And I’m not just talking about watches that have access to company emails or contacts.

The rise of health-related wearables, such as the Fitbit, are going to be targets of attacks. Those wristbands monitoring health provide valuable info such as your medical state (your heart rate) and GPS info. What makes it worse is that wearable software (and IoT devices, for that matter) doesn’t necessarily have a unified design framework and is still in the early stages when integrations can be clumsy and lead to vulnerabilities.

Unless a wearable device is absolutely vital to your business, it’s probably a good idea to hold off incorporating one into your company.

Be Smart, Be Practical

This isn’t meant to scare you like so many security articles do, but to give you an idea of what to expect and what you should consider when it comes to your company.Moving forward into 2016, the best advice I can give you is to make sure that your company’s software is up-to-date, keep up on the latest news regarding security (but don’t let it scare you), and please oh please, don’t store your customers data somewhere that’s not secure.

Fortune Teller Photo via Shutterstock

5 Comments ▼
Advertise Here

Christophe Primault


Christophe Primault Christophe is the co-founder and CEO at GetApp. GetApp is the largest independent business apps marketplace. Millions of businesses are using GetApp to discover, try and buy business apps (SaaS & Mobile). GetApp is also an important source of lead generation for thousands of business apps companies.

Latest Trending Business News




5 Reactions

  1. Martin Lindeskog

    Christophe: Thanks for this warning post! I will refer to it during a new course (study circle) on new media and referral marketing I will have next year. See apps as opportunities, but be aware of the security risks.

  2. Yes. There will be mobile viruses and I don’t know if I can keep my device protected.

  3. Hi Christophe,

    Thanks for the heads up. I do think mobile security is going to become a big issue this year. We don’t really make as big of a deal about mobile security, as much as we do about our laptop. This we unfortunately catch up with the world.

    Naomi

    • Christophe Primault

      Naomi: You are totally right about the disconnect people have between their laptops and mobile devices in terms of security. Moving forward, hopefully we’ll learn from PC mistakes and approach mobile security with more awareness and good practices. Thanks for reading!

Leave a Reply

Your email address will not be published. Required fields are marked *

*



Looking for templates, checklists or guides? The Small Business Resource Center has them!