Cyber security in 2017: 5 threats to watch out for
2016 has been another big year for cyber security. From record-breaking data breaches to widespread ransomware attacks, this surely was the year that hacking went mainstream.
But with 2016 now coming to a close, it’s time for look at what 2017 might have in store for us. As infrastructure and business models continue to evolve, so do the threats against them.
We spoke to five security experts for their take on the biggest threats we’ll face in 2017.
Large-scale connected device hacks
Wieland Alge, VP & GM EMEA at Barracuda Networks
“After some years in the making, we are starting to see a very wide scale adoption of rich IoT deployments; industrial freezers, smart kiosks, managed facilities, connected cars and industrial washing machines – all connected and hopefully protected.
The biggest threat we face in 2017 is a cyber attack that successfully targets and manages to take control of hundreds of thousands of these connected devices. This is the case for two reasons; firstly, it is clear that this kind of attack is already being planned, if not successfully executed, and secondly, the damage that a botnet of this size could cause, especially if attackers targeted critical infrastructure, could be catastrophic.
There have also already been some rumours of large-scale, business-critical deployments being compromised and held to ransom by cyber attackers. But 2017 will be the first year in which these incidents will become a widely publicised and regular occurrence.”
Attacks on on-premises applications
Eduard Meelhuysen, Head of EMEA at Bitglass
“On premises applications will present a major threat vector in 2017 and we’ll increasingly hear of attacks on this infrastructure throughout the year and beyond. The major cloud app vendors have invested heavily in security personnel and security infrastructure, and have proven their ability to effectively protect against cyber threats.
On the other hand, on premises applications commonly suffer from slow or non-existent patching and far less comprehensive security strategies than their public cloud counterparts. Cyber attackers know where these weaknesses lie and will find that on premises apps are the path of least resistance to valuable company data.”
Footprintless malware and ransomware
Thomas Fischer, Threat researcher and security advocate at Digital Guardian
“In 2017, we should expect an uptick in two attack vectors. First, there will be a rise in footprintless attacks, which are very difficult to detect. These attacks, which are also known as Ghostware, work by doing everything in-memory, so they leave no trace on the network or endpoint. As hacker groups are increasingly being run more like businesses, hacker R&D departments will develop more of these attacks, to be capable of bypassing security devices in order to exfiltrate data. Secondly, we will see more state-sponsored hackers attacking specific mobile devices in order to spy on their owners. We may also find that malicious parties will target mobile phones and use any compromising data they find to blackmail individuals in a more commercial campaign.
From a business perspective, the threat of ransomware stands to be the most disruptive cyber threat in 2017. Ransomware creates a “Denial of Access” to corporate assets. We talk a lot about stopping critical assets or data being lost in a breach, but if a company does get hit with ransomware, the loss of access to its data can, in itself, have a significant impact on its ability to do business.”
Hackers targeting IoT devices
Ashley Stevenson, Director of Identity Technology at ForgeRock
“As more and more devices, things and services come online through the IoT, legacy approaches to authentication, authorisation and identity management will need to change. Internet-connected devices like home lighting, garage doors and smart wearables will continue to be a prime target for cyber attackers in 2017 and simply using username and passwords to control access to these things just won’t be workable. It’s widely accepted that trust and security will be key to the mass adoption of IoT, so device manufacturers will be forced to look for ways to keep customers and their possessions safe.
The way forward will be to use passwordless identity management and continuous security techniques to maintain secure access to devices and services. One passwordless methodology that will gain traction through 2017 is push notifications – using real-time messaging to smartphones to grant access to data or authorise use of online services. Mobile phones are ideal for authentication because users are familiar with how they function, they’re closely associated physically with the individual, and they can receive notifications to the phone, or within specific apps running on the phone.”
Web application vulnerabilities
Ryan O’Leary, VP Threat Research Centre at WhiteHat Security
“It is no surprise then that web applications offer one of the largest and most lucrative openings for hackers. With more and more applications being developed to ever-tighter deadlines, they really do represent the Achilles heel of enterprise security. According to the 2016 Verizon Data Breach Investigations Report, web application attacks were the number one source of data loss, accounting for 40% of all incidents that resulted in a data breach.
Despite web applications representing a favourite attack vector for cyber criminals, WhiteHat’s recent research highlighted the current dismal state of application security; remediation rates are typically under 50% and vulnerabilities that are eventually resolved often stay open for months. With little sign on the horizon that organisations are making fundamental changes to their app development processes or security practices, there will be many more stories of big data breaches originating from the application layer continuing to hit the headlines in 2017.”
GfK and VMware: Innovating together on hybrid cloud
GfK has been the global leader in data and analytics for more than 85 years, supplying its clients with optimised decision inputs.
In its capacity as a strategic and technical partner, VMware has been walking GfK along its digital transformation path for over a decade.
“We are a demanding and singularly dynamic customer, which is why a close partnership with VMware is integral to the success of everyone involved,” said Joerg Hesselink, Global Head of Infrastructure, GfK IT Services.
Four years ago, the Nuremberg-based researcher expanded its on-premises infrastructure by introducing VMware vRealize Automation. In doing so, it laid a solid foundation, resulting in a self-service hybrid-cloud environment.
By expanding on the basis of VMware Cloud on AWS and VMware Cloud Foundation with vRealize Cloud Management, GfK has given itself a secure infrastructure and reliable operations by efficiently operating processes, policies, people and tools in both private and public cloud environments.
One important step for GfK involved migrating from multiple cloud providers to just a single one. The team chose VMware.
“VMware is the market leader for on-premises virtualisation and hybrid-cloud solutions, so it was only logical to tackle the next project for the future together,” says Hesselink.
Migration to the VMware-based environment was integrated into existing hardware simply and smoothly in April 2020. Going forward, GfK’s new hybrid cloud model will establish a harmonised core system complete with VMware Cloud on AWS, VMware Cloud Foundation with vRealize Cloud Management and a volume rising from an initial 500 VMs to a total of 4,000 VMs.
“We are modernising, protecting and scaling our applications with the world’s leading hybrid cloud solution: VMware Cloud on AWS, following VMware on Google Cloud Platform,” adds Hesselink.
The hybrid cloud-based infrastructure also empowers GfK to respond to new and future projects with astonishing agility: Resources can now be shifted quickly and easily from the private to the public cloud – without modifying the nature of interaction with the environment.
The gfknewron project is a good example – the company’s latest AI-powered product is based exclusively on public cloud technology. The consistency guaranteed by VMware Cloud on AWS eases the burden on both regular staff and the IT team. Better still, since the teams are already familiar with the VMware environment, the learning curve for upskilling is short.
One very important factor for the GfK was that VMware Cloud on AWS constituted an investment in future-proof technology that will stay relevant.
“The new cloud-based infrastructure comprising VMware Cloud on AWS and VMware Cloud Foundation forges a successful link between on-premises and cloud-based solutions,” says Hesselink. “That in turn enables GfK to efficiently develop its own modern applications and solutions.
“In market research, everything is data-driven. So, we need the best technological basis to efficiently process large volumes of data and consistently distill them into logical insights that genuinely benefit the client.
“We transform data and information into actionable knowledge that serves as a sustainable driver of business growth. VMware Cloud on AWS is an investment in a platform that helps us be well prepared for whatever the future may hold.”