Predictions for 2015: Security Threats on the Horizon

Posted on Apr 8th, 2015

When Former Secretary of State Hilary Clinton <a href="http://stockquotesnow.com/blog/key-questions-remaining-about-hillary-clintons-e-mails-usa-today/" data-cke-saved-href="http://stockquotesnow.com/blog/key-questions-remaining-about-hillary-clintons-e-mails-usa-today/">told reporters that her private server was “on property and protected . . . and there were no breaches,” the collective shudder that rippled through the IT security community tasked with protecting national data was palpable.

Setting aside any political ideology surrounding the revelation that Clinton went off network while holding the most senior foreign policy position in the United States government hierarchy, the situation exemplifies a virtual nightmare for information services personnel. The sea of red flags her statements raised in <a href="http://www.cnn.com/2015/03/10/politics/hillary-clinton-email-scandal-press-conference/index.html" data-cke-saved-href="http://www.cnn.com/2015/03/10/politics/hillary-clinton-email-scandal-press-conference/index.html">less than six minutes provides ample clues to the most challenging cyber threats on the 2015 horizon.

Blurry Perimeter Edges Create Challenges

While enterprises struggle to address issues with mobility and foreign device accommodation, integrating hybrid personal-official servers is BYOD on steroids. Commingling privileged data with personal minutia, effectively increases exposure risks from external sources.

When <a href="http://www.businessinsider.in/Here-Are-10-Internet-Security-Predictions-For-2015-BySymantec-Infographic/articleshow/45283833.cms" data-cke-saved-href="http://www.businessinsider.in/Here-Are-10-Internet-Security-Predictions-For-2015-BySymantec-Infographic/articleshow/45283833.cms">Symantec predicted evolving user behavior will move beyond passwords toward more stringent security measures, they may not have considered the possibility of government officials installing private servers. The reality today is many government contractors and DoD affiliates likely already deploy private servers, or will in the future. Similar threat vectors exist in healthcare, legal, and education environments.

Internal Hazards vs. External Threats

Not all industry experts and analysts agree about what the most significant risk points are.  According to this <a href="http://www.websense.com/assets/reports/report-2015-security-predictions-en.pdf" data-cke-saved-href="http://www.websense.com/assets/reports/report-2015-security-predictions-en.pdf">Websense report, and other published predictions, we’re likely to see at least one significant breach originating through the manufacturing sector. Where Symantec listed smart home devices as the number one threat facing IT security teams in 2015, Websense predicts it won’t be the appliances you have to worry about, rather a programmable logic controller or similar connected apparatus will open the door to cyber-attacks.

There’s Protection, and Then There’s Protection

Physically protecting hardware and equipment from theft and damage is laudable. However, you can’t point a loaded gun at a cyber-infiltrator. Physically protecting the hardware won’t do anything about sophisticated malware, phishing schemes and silent recon efforts. <a href="http://www.zdnet.com/article/2015-security-predictions-iot-attacks-to-join-cloud-breaches-and-ransomware/" data-cke-saved-href="http://www.zdnet.com/article/2015-security-predictions-iot-attacks-to-join-cloud-breaches-and-ransomware/">ZDNet expects an uptick in complex techniques that run in memory only mode, avoiding a physical footprint. Detecting fileless attacks will require enhanced antivirus and antimalware protocol.

Look for Cloudier Behavior

ZDNet predictions also include an increase in cloud-based application breaches, triggered by volumes of online activities like uploading personal photos, downloading entertainment files and online purchasing behavior. Hacker's don't intentionally advertise data extraction details. No visible evidence of an attack doesn't necessarily mean data won't be siphoned off when it's convenient for stealthy cyber-reconnaissance scouts.

As firewall solutions have evolved from UTM to NGFW to DCFW, there has been a consistent concentration on controlling outside elements. The next generation of firewall solutions must address internal risks. Internal Firewall (INFW) integrates visibility and protection across a broader landscape – borders, cloud applications, email, gateways – covering servers and endpoints. Rapidly deploying transparent security solutions is essential to protecting valuable data in real-time as opposed to traditional methods which require identifying a threat, initiating trace procedures and remediation.

Expertise

When considering the best way to protect your organization, turn to experts who can help.  TVAR Solutions is a Technical Value-Added Reseller serving the US government worldwide.  Since 2006, we have been ensuring that the Federal Government and its business partners achieve the best value from their information technology. Every situation is unique and TVAR works with best in class technology, like Fortinet, to develop the best solution to keep your organization safe and data secure.

Questions/Comments? Please email information@tvarsolutions.com

View more news and events

Let's Talk Today

Latest Happenings

Upcoming Events:
12/11-12/13 - Law Enforcement - Homeland Security Forum and Technology Exposition
1/10 - GSA, NTSB, HUD, DHS, FAA, DOE at L'Enfant Plaza
We're loving our new Denver office space! November 1, 2018
Here's to another great season, Capitals!
First team lunch in our new digs! We're now in Suite 240!
TVAR Solutions Named to CRN’s 2018 Solution Provider 500 List Read More
We're excited to welcome a new Civilian Rep, Adam Strisik to the team!
Happy to report 100% participation in our latest charitable giving campaign with GiveStream! We love being able to choose charities that we are passionate about! Find more info here!
We'd like to welcome two new members to the team!! Hunter MacBain, who is covering Air Force and Rosa Morales, who is our new Marketing Associate & Office Manager. Happy to have you both!
Gonzo was definitely Mr. Popular today at the TVAR office!
We have 2 new TVARian's! We'd like to welcome Natalie Lane, our new Accounting & HR Manager and Aaron Bradd who will be covering Department of Justice. Thrilled to have you both here with us.
At Super Computer 2017, our Account Manager Chris Clifton discussed TVAR Solutions' differentiators as well as our strong partnership with Panasas. Watch here! https://www.youtube.com/watch?v=VP657NG_Fj8&feature=youtu.be
Panasas Names TVAR Solutions 2016 Partner of the Year! February 28, 2017 Read more here.
We're very pleased to welcome Chris Norton, Lucas Arroyo, Sam O'Daniel, and Cris Musselwhite to the TVAR Team!
Nikki takes our Monday morning forecast meetings very seriously! November 21, 2016
We'd like to welcome our new Customer Support Rep, David Mendes to the team as well as a new Special Programs Rep Jim Rice! We're excited to have you both.
We loved giving back with Hewlett Packard Enterprise last week at their USO-Metro: Pack for the Troops Event!
"I chose the Pancreatic Cancer Action Network because we lost my grandfather in 2007 to pancreatic cancer. They hold wonderful fundraising events that my family participates in periodically and they're very passionate about helping those that are affected as well as raising funds for research. I love that TVAR has given us the opportunity to hand select charities we are passionate about." - Lauren Baird
We're happy to announce our new corporate giving campaign through Innovative Corporate Charitable Solutions! EVERY employee gets to choose a charity where a portion of TVAR's funds will go to! A message from our President, Dave Saunders: click here.
TVAR Solutions Named to CRN’s 2016 Solution Provider 500 List! Read More Here.
"Welcome to TVAR Solutions, can I help you?" - Nikki, one of our favorite TVAR dogs #TGIF
We start them early at TVAR...James learning how to forecast!