Skip Ribbon Commands
Skip to main content

Cybersecurity Trends to Watch out for in 2018


During the past year we have seen EU GDPR Preparations, Ransomware, and some very notable large scale cyber-attacks. So what developments should you keep an eye on during the next year?

In this NNIT Security Insights article, we will again take a look into the crystal ball, and share with you our predictions on what we are likely to face in the coming year.

1. EU GDPR Preparations

We are now only a few months away from the EU General Data Protection Regulation, which will enter into application on the 25th of May 2018. With a risk of fines of up to 4% of annual turnover, organizations will keep this item at the top of their lists in 2018. This is to ensure they are fully prepared to be in compliance as we reach May, and also to ensure they are prepared for potential cyber-attacks, aimed at taking the organizations’ personal data hostage.

2. Ransomware

Ransomware continues to evolve and is likely to become more and more targeted towards organizational attacks, attacks on Internet of Things devices and Critical National Infrastructure.

3. Artificial Intelligence Attacks and Defense

Artificial intelligence and machine learning is expected to play a larger part in both attacks towards organizations, and the defense activities organizations carry out to protect their systems and infrastructures.

4. Encryption

Encryption is expected to become more widely deployed in organizations, especially to address security considerations relating to storage and transfer of personal data. This is likely to include the areas of encryption in storage and encryption of data before it is sent over HTTPS connections.

5. Cryptocurrency Crimes

The increasing popularity and values of cryptocurrencies are likely to lead to an increase in cryptocurrency crimes, from theft of cryptocurrencies, to fraud and money laundering, to disruption in cryptocurrency exchanges.

Do you have anything to add? Do you think anything is missing? Please let me know and share your comments!


About the Author

John Clayton is an IT Management Consultant and Cybersecurity Specialist with more than 20 years’ experience in IT and Management Consulting, and with roles bridging Business and IT.

About NNIT Security Insights

NNIT Security Insights is a regular column where prominent NNIT IT security advisors share their thoughts on current and future IT security challenges and how to deal with them.

NNIT has its own Computer Emergency Response Team (CERT). If lightning strikes, we have the necessary competencies in-house to respond and assist. We have also developed a range of services that can help businesses to achieve the right level of security protection to protect the business from financial and reputational damage. 

You are welcome to contact us at if you want to know more about how NNIT can help your business increase its information security level.





Helge Skov Djernes+45 30758868hfsd@nnit.comInformation Security Management Consultant Skov Djernes



Application Security Health Check Service Security Health Check Service
Secure Development Life Cycle Coach Service Development Life Cycle Coach Service
Infosecurity 2020 2020
Are you prepared to protect your business-critical IT? you prepared to protect your business-critical IT?
Are you prepared to protect your business-critical IT? you prepared to protect your business-critical IT?
Protect your gold: How to avoid your data ending up in the wrong hands your gold: How to avoid your data ending up in the wrong hands
How scammers attack your company using CEO fraud scammers attack your company using CEO fraud
VR Cybersecurity Training Cybersecurity Training
Cloud Security Security
Identity & Access Management & Access Management