Skip Ribbon Commands
Skip to main content
< BACK

Cybersecurity Trends to Watch out for in 2018

 

During the past year we have seen EU GDPR Preparations, Ransomware, and some very notable large scale cyber-attacks. So what developments should you keep an eye on during the next year?

In this NNIT Security Insights article, we will again take a look into the crystal ball, and share with you our predictions on what we are likely to face in the coming year.

1. EU GDPR Preparations

We are now only a few months away from the EU General Data Protection Regulation, which will enter into application on the 25th of May 2018. With a risk of fines of up to 4% of annual turnover, organizations will keep this item at the top of their lists in 2018. This is to ensure they are fully prepared to be in compliance as we reach May, and also to ensure they are prepared for potential cyber-attacks, aimed at taking the organizations’ personal data hostage.

2. Ransomware

Ransomware continues to evolve and is likely to become more and more targeted towards organizational attacks, attacks on Internet of Things devices and Critical National Infrastructure.

3. Artificial Intelligence Attacks and Defense

Artificial intelligence and machine learning is expected to play a larger part in both attacks towards organizations, and the defense activities organizations carry out to protect their systems and infrastructures.

4. Encryption

Encryption is expected to become more widely deployed in organizations, especially to address security considerations relating to storage and transfer of personal data. This is likely to include the areas of encryption in storage and encryption of data before it is sent over HTTPS connections.

5. Cryptocurrency Crimes

The increasing popularity and values of cryptocurrencies are likely to lead to an increase in cryptocurrency crimes, from theft of cryptocurrencies, to fraud and money laundering, to disruption in cryptocurrency exchanges.

Do you have anything to add? Do you think anything is missing? Please let me know and share your comments!

 

About the Author

John Clayton is an IT Management Consultant and Cybersecurity Specialist with more than 20 years’ experience in IT and Management Consulting, and with roles bridging Business and IT.

About NNIT Security Insights

NNIT Security Insights is a regular column where prominent NNIT IT security advisors share their thoughts on current and future IT security challenges and how to deal with them.

NNIT has its own Computer Emergency Response Team (CERT). If lightning strikes, we have the necessary competencies in-house to respond and assist. We have also developed a range of services that can help businesses to achieve the right level of security protection to protect the business from financial and reputational damage. 

You are welcome to contact us at nnitcontact@nnit.com if you want to know more about how NNIT can help your business increase its information security level.

 

 

 

 

Helge Skov Djernes+45 30758868hfsd@nnit.comInformation Security Management Consultanthttps://www.linkedin.com/in/helgeskovdiernaes/Helge Skov Djernes

 

 

Cloud Securityhttps://www.nnit.com/cybersecurity/Pages/Cloud-Security.aspxCloud Security
Managed Securityhttps://www.nnit.com/cybersecurity/Pages/Managed-Security.aspxManaged Security
VR Cybersecurity Traininghttps://www.nnit.com/cybersecurity/Pages/VR-Cybersecurity-Training.aspxVR Cybersecurity Training
NNIT Security Insightshttps://www.nnit.com/cybersecurity/Pages/security-insights.aspxNNIT Security Insights
Identity & Access Managementhttps://www.nnit.com/cybersecurity/Pages/iam.aspxIdentity & Access Management
Cybersecurity Consultinghttps://www.nnit.com/cybersecurity/Pages/security-advisory.aspxCybersecurity Consulting
Digital Work Placehttps://www.nnit.com/advisory-services/NNIT_Academy/Pages/Digital-Work-Place.aspxDigital Work Place
How scammers attack your company using CEO fraudhttps://www.nnit.com/cybersecurity/Pages/How-scammers-attack-your-company-using-CEO-fraud.aspxHow scammers attack your company using CEO fraud
One Year with GDPR – Continuous Compliance is still a Challengehttps://www.nnit.com/cybersecurity/Pages/gdpr-one-year-on.aspxOne Year with GDPR – Continuous Compliance is still a Challenge
Application Security Health Check Servicehttps://www.nnit.com/cybersecurity/Pages/Application-Security-Health-Check-Service.aspxApplication Security Health Check Service