What will be the single biggest security threat of 2017?
Trends

What will be the single biggest security threat of 2017?

At the very end of 2015 we ran a straw poll of individuals in the security space to determine what the single biggest security threat of 2016 would be. We divided the 74 “unstructured” comments into a number of lose sections with “people” emerging as the most popular response.

Last year the security breaches came in even more thick and fast, so, we decided to run the same poll again. To achieve this we simply asked industry professionals to tell us what they think the single biggest security threat of 2017 will be along with a short explanation as to why.

Out of the 86 usable comments we received, over a quarter (26) selected the Internet of Things. Within this section there was a lot of talk about the rise of DDoS attacks and botnets. Breaches related to staff and users came in a not-so-close second with 13 responses.

Amongst the general comments a wide number of different threats were highlighted. Data – and the vast glut of personal details now for sale on the dark web got a mention. While the continued reliance on passwords, rise of criminal AI and the increased professionalisation of cyber skills were also called out.

Of course, in some ways this is a spurious exercise. It is hard to reliably pull out a “single biggest threat” of the year, especially when so many trends are so closely interlinked. But the wide range of response is interesting. For example, although passwords were mentioned by a couple of individuals as a problem, the main alternative, biometric authentication itself was also singled out as a core security threat.

To continue reading...


Please login or register to view your article. If you do not have or do not remember your password, please click on the “Forgotten your password?” link at the bottom.
If you do not yet have a password but are an existing user, please use the “Forgotten your password?

PREVIOUS ARTICLE

«Quotes of the Week: "An insult to life"

NEXT ARTICLE

The need for ICT research in Africa»
author_image
Kathryn Cave

Editor at IDG Connect

  • twt
  • twt
  • Mail

Add Your Comment

Recommended for You

silhouette

Which Enterprise Password Managers work the best?

IDG Connect tackles the tech stories that matter to you

kathryn-cave

The IoT “time bomb” report: 49 security experts share their views

Kathryn Cave looks at the big trends in global tech

phil-muncaster

China’s Cybersecurity Law: Game over for foreign firms?

Phil Muncaster reports on China and beyond

Most Recent Comments

Our Case Studies

IDG Connect delivers full creative solutions to meet all your demand generatlon needs. These cover the full scope of options, from customized content and lead delivery through to fully integrated campaigns.

images

Our Marketing Research

Our in-house analyst and editorial team create a range of insights for the global marketing community. These look at IT buying preferences, the latest soclal media trends and other zeitgeist topics.

images

Poll

Should companies have Bitcoins on hand in preparation for a Ransomware attack?