Separator

Trend Micro Predicts 2018 Cyberattacks Will Rely on Vulnerabilities

Separator
Trend Micro Predicts 2018 Cyberattacks Will Rely on Vulnerabilities

CEO Insights Team

This year, cyberattacks continued to plague business leaders, with major breaches occurring due to known vulnerabilities. Trend Micro Incorporated, a global leader in cybersecurity solutions, predicts the trend of known vulnerabilities being used in major attacks will continue in 2018 as corporate attack surfaces expand and expose more security holes. Patch management and employee education should be prioritized for all executives to protect an organization’s most critical data.

As information technology and operational technology (IT/OT) continue to converge, enterprise applications and platforms will be at risk of manipulation and vulnerabilities, as stated in Trend Micro’s 2018 predictions report. Additionally, Trend Micro predicts an increase in Internet of Things vulnerabilities as more devices are manufactured without security regulations or industry standards. Overall, the increased connectivity and enlarged attack surface present new opportunities for cybercriminals to leverage known issues to penetrate a corporate network.

Ransomware will continue to be a mainstay due to its proven success. There will be an increase in targeted ransomware attacks, in which the criminals go after a single organization to disrupt operations and force a larger ransom payout. Business Email Compromise (BEC) attacks will also continue to gain popularity with attackers, as the return on investment for successful attacks is quite high.

“We foresee that the ransomware business model will still be a cybercrime mainstay in 2018, while other forms of digital extortion will gain more ground.
The ransomware attacks will manifest itself in a more ‘Specialized’ and ‘Targeted manner’, unlike the earlier approach. With respect to India, in 2018 we will experience more number of attacks targeted at the ATMs, especially malware attacks. We also expect to see a rise in security incidents across Public Cloud platforms,” said Nilesh Jain, Country Manager, India & SAARC, Trend Micro.

“We at Trend Micro are constantly scouting out future threats that will have the greatest impact for businesses, and we predict which vulnerabilities will make the biggest waves in the coming year,” said Rik Ferguson, VP of security research for Trend Micro. “Many devastating cyberattacks in 2017 leveraged known vulnerabilities that could have been prevented had they been patched beforehand. This trend will continue next year as corporate attack surfaces expand and expose more security holes. While this remains a challenge for enterprises, executives should prioritize vulnerability management as they make 2018 cybersecurity plans, particularly in the looming shadow of GDPR implementation.”

Trend Micro Incorporated predicts the trend of known vulnerabilities being used in major attacks will continue in 2018 as corporate attack surfaces expand and expose more security holes


“The private sector continues to be under siege from a variety of cyber threats,” said Edwin Martinez, chief information security officer for CEC Entertainment. “Institutions must continue to share critical information so we can better prevent and respond to these cyber threats limiting exposure to sensitive data.”

Threat actors will also leverage growing technologies, like blockchain and machine learning, to enhance obfuscation against traditional cybersecurity protections. For this reason, the company recommends a layered, cross-generational defense strategy, which combines the latest security techniques with proven tactics that reinforce nearly 30 years of experience protecting some of the biggest global brands.

In Print




Most Viewed

From 'Volume' to 'Value': India Inc's Mantra to Capture the Global Pharmaceutical Market A Fight Back from Arabian Peninsula When will The Tech Industry’s Lay-off Season End? The Story of a Broken Trust Technology Key To Global Travel Recovery What To Keep In Mind When Selecting The Right Air Compressor For Replacement? The Best Way to Recover from Ransomware Attacks How Tensions Grew Worse between Elon Musk and Donald Trump New Markets, New Brands: Tailoring Success for Different Places Empowered Leadership in a Changing Legal World Four Key Steps For Healthcare Providers To Combat Ransomware Turning Vision into Value: How I Built Purposeful Digital Ecosystems in the UK Dave Thomas: A Role Model for Aspiring Entrepreneurs, Philanthropists Digital Analytics Products: How Organizations Choose Them Kelly Ortberg: The New Boeing CEO Who is Already on the Headlines India’s Military Alacrity for Modern Threats Reshma Saujani: Reshaping Social Attitudes Around Gender and Tech India is Manifesting Leadership in Drone Technology 5 Greatest Role Models in the Manufacturing Industry Creating a Stronger Ecosystem by Fixing the Nuts & Bolts of the Economy Microsoft for India: Making India for Future Ready India's UPI Launch in France Opens Gateway to Global Fintech Power Tim Cook Nears Retirement, Who Will Take Over Apple's Throne? Soil Based Microbial Fuel Cells Could Protect the Environment from Flammable Chemicals The mantra of Academic Collaboration Echoes on this Teachers’ Day Indian semiconductor Boom Has Abundant Room for SME-preneurs Indian Healthcare Ecosystem is Hosting a Multidimensional Paradigm Shift Being a True Republic: You Got to Love this New, Powerful India Qatar World Cup 2022 Might Be Over, But Arabian Peninsula’s Sports Dream is Just Beginning Reimagining the UK–India Partnership in a Changing Global Order These Schemes Will Facilitate Women Entrepreneurs Decarbonization & Sustainable Future: Technology & What it can Do?


🍪 Do you like Cookies?

We use cookies to ensure you get the best experience. Read more…