Skip to content

TechRepublic

  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • Accounting
  • CRM
  • Academy
Resources
  • TechRepublic Premium
  • TechRepublic Academy
  • Newsletters
  • Resource Library
  • Forums
  • Sponsored
Go Premium
Popular Topics
  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • Accounting
  • CRM
  • Academy
  • Project Management
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
View All Topics
Go Premium
Security

Photos: Top 10 cybersecurity issues to watch in 2016

By Michael Kassner November 28, 2015, 1:00 PM PST

Image
1
of 7

facebook-f8-2015-mark-zuckerberg-3.jpg
facebook-f8-2015-mark-zuckerberg-3.jpg
Photos: Top 10 cybersecurity issues to watch in 2016

2: Governments will step up their demands for information from companies.

Image: James Martin/CNET

2: Governments will step up their demands for information from companies.

The now defunct US-EU Safe Harbor agreement is alreadyrncreating fallout. According to EU Business,rn”Ireland’s High Court ordered the Irish Data Protection Commissioner tornexamine whether to suspend the transfer of Facebook users’ data from Europe tornthe United States.”

Governments demanding companies to turn over sensitive informationrnwill continue, resulting in organizations not knowing whom to trust and whatrnregulations they may be violating.

Also see: Cloud vendors seek refuge in Germany to comply with EU data laws

Image: James Martin/CNET
tallinn.jpg
tallinn.jpg
Photos: Top 10 cybersecurity issues to watch in 2016

3: Countries will take steps to control the internet within their borders.

Image: iStock

3: Countries will take steps to control the internet within their borders.

With trust falling to the wayside, experts suggest that each countryrnwill try to control the internet within its borders. Managing director ofrnDiscern Analytics and consulting associate professor at Stanford, Paul Saffo writes, “Thernpressures to balkanize the global internet will continue and create newrnuncertainties. Governments will become more skilled at blocking access tornunwelcome sites.”

Also see: Exclusive:Inside the ProtonMail siege: how two small companies fought off one of Europe’slargest DDoS attacks

Image: iStock
istock000028845070small.jpg
istock000028845070small.jpg
Photos: Top 10 cybersecurity issues to watch in 2016

5: Mobile apps will become the target of choice.

Image: iStock

5: Mobile apps will become the target of choice.

Mobile apps are becoming the target of choice; the Ponemon Institute decided to look at why. “Among the more than 400 organizations studied — nearly 40 percent of which were Fortune 500 companies — almost 40 percent of them aren’t scanning the code in their apps for security vulnerabilities, leaving the door wide open to the potential hacking of sensitive user, corporate, and customer data,” mentions Dr. Larry Ponemon. “The average organization tests fewer than half of the mobile apps it builds, and 33 percent of the surveyed companies never test their apps.”

This is not expected to change anytime soon.

Also see: 3 security challenges when deploying mobile apps

Image: iStock
ransomware.jpg
ransomware.jpg
Photos: Top 10 cybersecurity issues to watch in 2016

6: Encryption is not and will not be a deterrent.

Image: iStock/nevarpp

6: Encryption is not and will not be a deterrent.

During the past several months, government law enforcement agenciesrnhave been demanding that backdoors be added to encryption software. As can bernexpected, security pundits fought back, and it appears they have won. However,rnthere are those who aren’t so sure — maybe this is all a smoke screen.

Andy Greenberg in his WIRED article Cops Don’t Need a Crypto Backdoor to Get Into Your iPhone interviews several security experts, asking if backdoors are evenrnneeded. “In spite of the big words the FBI has used over the last year,rnthe situation isn’t quite as dire as they make it out to be,” ChrisrnSoghoian, principal technologist for the ACLU tells Greenberg. “The kindrnof encryption tech companies are giving us is geared towards protecting us fromrna thief stealing our laptop. It’s not designed to keep out a government agentrntrying to get your data with or without a court order.”

Also see: Encryption:You can’t put the genie back in the bottle

Image: iStock/nevarpp
Photos: Top 10 cybersecurity issues to watch in 2016

7: Lax IoT security will become apparent.

Image: iStock

7: Lax IoT security will become apparent.

The IoT device onslaught is coming, however, not this year. “Werndo not expect attacks on the IoT to become widespread yet. Most attacks arernlikely to be ‘whitehat’ hacks to report vulnerabilities and proof of conceptrnexploits,” Michael Fimin writes in this Netwrix Community column.

That will not be the case in 2016, especially if the bad guys readrnarticles like John Dixon’s Who Will Step Up To Secure The Internet Of Things?

“Ifrntoday’s titans of technology won’t step up to secure the IoT, that endeavor mayrnfall to the multitude of startup companies that are fueling much of thernindustry’s current growth,” mentions Dixon. “Gartner estimates byrn2017, more than half of all IoT products and services will be developed byrncompanies less than three years old. Moreover, while some of these newcomersrnare likely to have formidable technical expertise, many will lack the know-howrnor capability to implement the tight security that is needed.”

Also see: The IoT security challenge: Can Information Xchange fill the gap?

Image: iStock
security_hacker_hand_on_keyboard-610.jpg
security_hacker_hand_on_keyboard-610.jpg
Photos: Top 10 cybersecurity issues to watch in 2016

8: More "qualified" security professionals will be needed.

Image: iStock

8: More "qualified" security professionals will be needed.

When it comes to security, the best defenders are ironically the bestrnattackers, and right now there is a dire lack of qualified defenders. However,rnthere is a more immediate problem. According to ISF Global Vice President Steve Durbin, there are not enough qualified security professionals to go around.rnThis will not improve in 2016, with both businesses and government agenciesrnfighting over those indeed who have the right qualifications.

Also see: Photos: 10 of the best places to study cybersecurity

Image: iStock
Photos: Top 10 cybersecurity issues to watch in 2016

9: Security is less important to the newer generations.

Image: iStockphoto/scyther5

9: Security is less important to the newer generations.

The trend from one generation to the next is to view security andrnprivacy in a way that scares the daylights out of the previous generation. Forrnexample, according to Ben Rossi a Ricohrnstudy finds that 30% of Generation Z will be frustrated by the lack of informationrnsharing and company pushback on BYOD. Everyone is looking for a happy medium,rnbut will not find it in 2016.

Also see: Security and privacy: New challenges (ZDNet/TechRepublic special feature)

Image: iStockphoto/scyther5
  • Security
  • Account Information

    Share with Your Friends

    Photos: Top 10 cybersecurity issues to watch in 2016

    Your email has been sent

Share: Photos: Top 10 cybersecurity issues to watch in 2016
Image of Michael Kassner
By Michael Kassner
Information is my field...Writing is my passion...Coupling the two is my mission.
  • Account Information

    Contact Michael Kassner

    Your message has been sent

  • |
  • See all of Michael's content

Daily Tech Insider

If you can only read one tech story a day, this is it.

Cybersecurity Insider

Stay abreast of the latest cybersecurity news, solutions, and best practices

TechRepublic TechRepublic
  • TechRepublic on Facebook
  • TechRepublic on X
  • TechRepublic on LinkedIn
  • TechRepublic on YouTube
  • TechRepublic on Pinterest
  • TechRepublic RSS
Services
  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers
Explore
  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • Editorial Policy
  • Legal Terms
  • Privacy Policy
© 2025 TechnologyAdvice. All rights reserved.
CLOSE

Create a TechRepublic Account

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

Already registered? Sign In
Use Facebook
Use Linkedin

* - indicates required fields

CLOSE

Sign in to TechRepublic

Not a member? Create an account
Use Facebook
Use Linkedin

Lost your password? Request a new password

CLOSE

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Check your email for a password reset link. If you didn't receive an email don't forgot to check your spam folder, otherwise contact support.

Back to login
1 Finish Profile
2 Newsletter Preferences
CLOSE

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

No thanks, continue without
1 Finish Profile
2 Newsletter Preferences
CLOSE

Want to receive more TechRepublic news?

Newsletter Name
Subscribe
Daily Tech Insider
Daily Tech Insider AU
TechRepublic UK
TechRepublic News and Special Offers
TechRepublic News and Special Offers International
Executive Briefing
Innovation Insider
Project Management Insider
Microsoft Weekly
Cloud Insider
Data Insider
Developer Insider
TechRepublic Premium
Apple Weekly
Cybersecurity Insider
Google Weekly
Toggle All
No thanks, continue without

You're All Set

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add [email protected] to your contacts list.

Back to Home Page
×