Security Landscape in 2014: 11 Predictions From the Experts

1 - Security Landscape in 2014: 11 Predictions From the Experts
2 - Wearable Tech Will Slowly Gain Adoption
3 - Developers Get More Concerned About App Security
4 - For Targeted Attacks, Size Doesn't Matter
5 - Biometrics Alternatives Coming Next Year
6 - 80 Percent of Time Will Be Spent Using Mobile Apps
7 - Credit Card Companies Will Market Security Services
8 - Organizations Will Own All Their Data
9 - Collaborative Economy Will Grow
10 - 2014: Broader Adoption of Google Glass
11 - Connected Homes Introduce a Creepy New Lifestyle
12 - Cloud Storage Risk Will Grow
1 of 12

Security Landscape in 2014: 11 Predictions From the Experts

by Chris Preimesberger

2 of 12

Wearable Tech Will Slowly Gain Adoption

Wearable tech will be more of a novelty next year, but the biggest risk to be aware of is Near-Field Communication (NFC) hacking, or threats within a small proximity. As wearable tech gear communicates with other nearby gadgets, more hacks can be targeted to those nearby —Grayson Milbourne

3 of 12

Developers Get More Concerned About App Security

Developers are becoming more aware of secure app development practices and risky app behaviors to avoid. That said, some app developers will continue to seek new ways to generate revenue from building apps that may intrude on privacy. —Grayson Milbourne

4 of 12

For Targeted Attacks, Size Doesn't Matter

Whether you're a Fortune 500 company or a small business, cyber-criminals will continue to pursue targeted attacks, from advanced persistent threats (APTs) to spear-phishing. Cyber-criminals will continue to invent new ways to gain access to important files. —Grayson Milbourne

5 of 12

Biometrics Alternatives Coming Next Year

Apple's fingerprint scanner is just the beginning for biometrics alternatives coming next year. From eye-color scanners to heartbeat rate monitor sensors, we'll see mobile devices leveraging new methods to authenticate users. —Grayson Milbourne

6 of 12

80 Percent of Time Will Be Spent Using Mobile Apps

According to app analytics firm Flurry, we spend the majority of our time on mobile devices using our apps, but app security is not up to par. In 2014, hackers will continue to target apps—the most vulnerable point on a mobile device—as a new conduit to mobile infections. —Grayson Milbourne

7 of 12

Credit Card Companies Will Market Security Services

Major credit card companies are already working to update their security standards for businesses accepting their credit cards. VISA, Mastercard and other major card brands have issued new requirements starting Jan. 1, 2014, to protect customers against cyber-attacks. Banks and credit card companies will market their security services instead of savings (i.e., low APR rates) or other perks. Financial institutions have the most to lose, so they'll have big plans to educate users on security practices. —Grayson Milbourne

8 of 12

Organizations Will Own All Their Data

In 2014, business will be increasingly conducted over untrusted networks and devices, and mounting pressure to embrace the cloud and mobility will compound the risk. Organizations will take ownership of their information by turning to data-level security that is agnostic to device, application, network, cloud provider or storage provider. Companies will look for outward-facing solutions that protect data at the point of origination, keeping it secure as it moves away from the center of the organization. This will enable companies to securely share data with customers and partners via ad hoc relationships beyond the organization's domain. —Jim Ivers

9 of 12

Collaborative Economy Will Grow

There is a steady rise of the collaborative economy and lots of new apps that store your credit information, and make buying services or products easier than ever. Given the balkanization of online payment systems, how do you protect yourself? In the New Year, paying via mobile for everything from catching a cab to ordering lunch will be increasingly common. It's easy and convenient, but there still aren't enough security protocols in place. The best way to protect yourself is to be wary about which apps you give your credit card, and never give a debit card to a mobile app. Once you do this, keep an eye on your statements; your bank can protect you from fraud, but only if you catch it first. —Charles McColgan

10 of 12

2014: Broader Adoption of Google Glass

Next year, we'll see broader adoption of Google Glass and smartwatches from employees. Google is preparing for wider adoption and a more user-friendly approach, so what does this mean for companies allowing Google Glass users to bring their devices to work? Critical information is at risk because hackers will use the loopholes in these devices for targeted attacks. —Charles McColgan

11 of 12

Connected Homes Introduce a Creepy New Lifestyle

The connected home introduces a new "creepy factor." Modern tech has introduced Internet-connected front door locks and video surveillance in the home, meaning targeted attacks could result in scary scenarios in which attackers remotely breach home security systems. —Charles McColgan

12 of 12

Cloud Storage Risk Will Grow

While enterprises plan to move more data to the cloud, they need to be aware of employees accessing those files. Consumers will continue to use free cloud tools because they are easy to access and cost nothing. —Charles McColgan

Top White Papers and Webcasts