{"id":23177,"date":"2017-12-12T06:00:55","date_gmt":"2017-12-12T13:00:55","guid":{"rendered":"https://www.webroot.com/blog/?p=23177"},"modified":"2018-02-09T13:58:40","modified_gmt":"2018-02-09T20:58:40","slug":"10-cybersecurity-predictions-2018","status":"publish","type":"post","link":"https://www.webroot.com/blog/2017\/12\/12\/10-cybersecurity-predictions-2018\/","title":{"rendered":"10 Cybersecurity Predictions for 2018"},"content":{"rendered":"<p>It has been a turbulent year of devastating ransomware attacks (e.g. NotPetya) and gut-wrenching breaches (e.g. Equifax). Undoubtedly, the question on everyone\u2019s mind is, \u201cwhat\u2019s in store for us in the New Year?\u201d Webroot\u2019s top 10 cybersecurity predictions for 2018 covers everything from ransomware and breaches to mobile, cryptocurrency, and government.We\u2019ve grouped our predictions to help you navigate this glimpse into one possible cybersecurity future.<\/p>\n<h3>Malware will get smarter and threats more serious.<\/h3>\n<p>Malware campaigns will use AI to make secondary infection decisions based on what they\u2019ve learned from previous campaigns. <em>\u2013 Gary Hayslip, chief information security officer<\/em><\/p>\n<p>We will see the first health-related ransomware targeting devices like pacemakers. <em>\u2013 Eric Klonowski, sr. advanced threat research analyst<\/em><\/p>\n<h3>We haven\u2019t seen the last of breaches.<\/h3>\n<p>I predict a minimum of 3 separate breaches of at least 100 million accounts each. I\u2019d be willing to bet the data has already been compromised, but the affected organizations won\u2019t learn of the breach until next year. <em>\u2013 Tyler Moffitt, sr. advanced threat research analyst<\/em><\/p>\n<h3>Not even biometric security will be safe from malicious actors.<\/h3>\n<p>We will see the first biometric-access-based exploits using facial recognition or fingerprint access. <em>\u2013 Eric Klonowski, sr. advanced threat research analyst<\/em><\/p>\n<h3>Consumers will want more from governments to keep them safe.<\/h3>\n<p>Consumers fighting back: 2018 will see major a major backlash from consumers (perhaps in the form of class action lawsuits), necessitating more regulations around data protection, particularly in the U.S. <em>\u2013 David Kennerley, director of threat research <\/em><\/p>\n<h3>Infosec will become a C-level priority.<\/h3>\n<p>The <a href=\"https://www.webroot.com/blog/2017\/08\/15\/day-life-chief-information-security-officer\/\">CISO role<\/a> will be mandatory for all organizations who do business with the Federal Government. <em>\u2013 Gary Hayslip, CISO<\/em><\/p>\n<h3>Being a mobile-first society will come with greater costs.<\/h3>\n<p>We will see the first widespread worming mobile phone ransomware, perhaps spread by SMS or MMS. <em>\u2013 Eric Klonowski, sr. advanced threat research analyst <\/em><\/p>\n<h3>Cryptocurrency will continue to rise and impending legislature is inevitable.<\/h3>\n<p>Malware distribution will rise and fall in conjunction with Bitcoin value. <em>\u2013 Christopher Cain, associate malware removal engineer<\/em><\/p>\n<h3>GDPR will set a tone, for better or worse, and businesses should prepare on all sides.<\/h3>\n<p>Companies who trade with the European Union will suddenly panic over GDPR requirements and just encrypt everything in a knee-jerk response. <em>\u2013 Jonathan Giffard, sr. product manager<\/em><\/p>\n<h3>The boom in the IoT space will bring stricter oversight to device manufacturers.<\/h3>\n<p>Data collected from IoT devices will be aggregated and used to develop an even larger, more involved picture of customers\u2019 habits, constituting a major breach of privacy without consent.<em> \u2013 Gary Hayslip, CISO<\/em><\/p>\n<p>Do you have any cybersecurity predictions for 2018? Share your thoughts with us on Twitter with the tag #CyberIn2018.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It has been a turbulent year of devastating ransomware attacks (e.g. NotPetya) and gut-wrenching breaches (e.g. Equifax). Undoubtedly, the question on everyone\u2019s mind is, \u201cwhat\u2019s in store for us in the New Year?\u201d Webroot\u2019s top 10 cybersecurity predictions for 2018 covers everything from ransomware and breaches to mobile, cryptocurrency, and government.We\u2019ve grouped our predictions to [&hellip;]<\/p>\n","protected":false},"author":71,"featured_media":23201,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[21639,21627,21619,21647,21217,21635,21631,21621,5329,20415,21637,21629,21623,21649,6377,21633,21625,21617,4061,6367],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23177"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=23177"}],"version-history":[{"count":7,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23177\/revisions"}],"predecessor-version":[{"id":23197,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/23177\/revisions\/23197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/23201"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=23177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=23177"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=23177"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=23177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}