Pulse

By GCN Staff

Blog archive

Less malware predicted for 2014 but new tactics emerge

Cybersecurity was a hot topic in 2013 with agencies increasingly focusing on insider threats, attacks from nation states, and compliance. Last week Websense Security Labs released its cybersecurity predictions for 2014, suggesting areas IT managers should monitor: 

Advanced malware volume will decrease. Research has shown that the quantity of new malware is beginning to decline. However, this means cybercriminals will rely less on high-volume advanced malware because over time it runs a higher risk of detection. They will instead use lower volume, more targeted attacks to hack into networks. 

Attackers will be more interested in cloud data than networks. Because critical business data is increasingly stored in cloud-based systems, criminals will focus their attacks more on data stored in the cloud than data stored on the network. 

Java will remain highly exploitable and highly exploited. Organizations that continue to use older versions of Java will remain extremely exposed to exploitation. In 2014 criminals will devote more time to finding new uses for tried-and-true attacks and crafting other aspects of advanced, multistage attacks. 

Attackers will compromise organizations via professional social networks. As the business community continues to increase its social media use, attackers will increasingly use professional websites, such as LinkedIn, to get in touch with executives to gather intelligence and compromise networks.

Criminals will target the weakest links in the “data-exchange chain.” Attackers will target the consultants outside the network who have the most information. This includes contractors, vendors and others who typically share sensitive information with the large corporate and government entities. 

Read the full report.

Posted by GCN Staff on Nov 21, 2013 at 9:15 AM


Featured

  • Telecommunications
    Stock photo ID: 658810513 By asharkyu

    GSA extends EIS deadline to 2023

    Agencies are getting up to three more years on existing telecom contracts before having to shift to the $50 billion Enterprise Infrastructure Solutions vehicle.

  • Workforce
    Shutterstock image ID: 569172169 By Zenzen

    OMB looks to retrain feds to fill cyber needs

    The federal government is taking steps to fill high-demand, skills-gap positions in tech by retraining employees already working within agencies without a cyber or IT background.

  • Acquisition
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA to consolidate multiple award schedules

    The General Services Administration plans to consolidate dozens of its buying schedules across product areas including IT and services to reduce duplication.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.