{"id":5422,"date":"2016-11-15T14:41:27","date_gmt":"2016-11-15T13:41:27","guid":{"rendered":"https:\/\/www.esferize.com\/cybersecurity-trends-2017\/"},"modified":"2021-09-07T17:10:11","modified_gmt":"2021-09-07T15:10:11","slug":"cybersecurity-trends-2017","status":"publish","type":"post","link":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/","title":{"rendered":"Cybersecurity: Trends for 2017"},"content":{"rendered":"<p>Today we look to the more immediate future of security in digital environments. We live in a new era for cyber security. The threats now extend to mobile phones, Internet of Things devices, the cloud and critical infrastructure. What are the cybersecurity trends for 2017?<\/p>\n<p><strong>Computers are no longer the only target for cyber attacks<\/strong>. More and more devices are connected to the network, which means that cyber risks are multiplying and threats are growing exponentially.<\/p>\n<p><a href=\"https:\/\/www.checkpoint.com\"><em>Check Point Software Technologies<\/em><\/a> has identified five key trends in cyber security based on data extracted from its annual report. Perhaps the most relevant is the<strong> increase in cyber risks for mobile devices<\/strong>.\u00a0It is predicted that over the next year, <strong>one in five employees will be responsible for a security breach in their company<\/strong> that will affect corporate data. This will be unintentional, <strong>through mobile malware or malicious Wi-Fi networks<\/strong>. Check Point believes that this will be an increasingly important business security issue, with the challenge of <strong>balancing productivity, privacy and protection<\/strong>.<\/p>\n<p><strong>Another important challenge is the <a href=\"https:\/\/www.esferize.com\/en\/internet-of-things-day\/\">deployment of the Internet of Things<\/a> (IoT)<\/strong>.\u00a0The company warns that in 2017 we will have to be <strong>prepared to deal with cyber-attacks aimed at all types of connected devices<\/strong>.\u00a0 It also points out that <strong>offensives against industrial IOT are planned<\/strong>.\u00a0Thus, it specifies that the convergence between information technology (IT) and operational technology (TO) makes them more vulnerable, especially SCADA environments that frequently use old systems for which no patches exist or are not used. Check Point points out that companies will need to extend security controls on both systems and implement threat prevention solutions for IT and OTA.<\/p>\n<h3>Cybersecurity in the cloud<\/h3>\n<p><strong>The cybersecurity of the cloud is also a challenge<\/strong>.\u00a0Organisations are increasingly storing data in the cloud, typically using hybrid network infrastructures.\u00a0<strong>Additional backdoors are created through which hackers have access to other company systems<\/strong>.\u00a0This is a truly critical aspect as any offensive that interrupts the service or knocks down one of the main cloud providers will affect all the company&#8217;s customers.<\/p>\n<p>Check Point also highlights the <strong>growth in ransomware attacks affecting cloud data centres<\/strong>.\u00a0In the coming year we will see both attacks through <strong>encrypted files that will spread from cloud to cloud<\/strong> and offensives from <strong>hackers using the cloud as a volume multiplier<\/strong>.<\/p>\n<p>On the other hand, the company emphasises the <strong>risk to which critical infrastructures are exposed<\/strong>.\u00a0As it explains, they <strong>are very vulnerable to cyber attacks, as almost all of them were built before malware was a real danger<\/strong>, so their design does not take into account the basic principles of cybersecurity. For example, he recalls that the first blackout caused by cybercriminals was recorded at the beginning of the year. In 2017, it will be necessary to prepare for <strong>possible attacks on networks and systems, perpetrated by countries, terrorists and organised criminals<\/strong>.<\/p>\n<p>As we have been insisting <a href=\"https:\/\/www.esferize.com\/en\/?s=ciberseguridad\">in recent blog posts<\/a>, cybersecurity is a vitally important element for any organisation. For this reason, it must be controlled by experts in the field. The pace at which technology advances also forces us to constantly update ourselves and protect ourselves from new risks that any company may suffer.<\/p>\n<p>&nbsp;<\/p>\n<p>Source: <a href=\"https:\/\/www.silicon.co.uk\/\">silicon.es<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today we look to the more immediate future of security  [&#8230;]<\/p>\n","protected":false},"author":7,"featured_media":4972,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[256,242,225,237,257,228,223,229],"tags":[260,251,253,255,261,262,232,263,230,258,259,235],"class_list":["post-5422","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-big-data-en","category-cloud-en","category-cybersecurity","category-internet-en","category-iot-en","category-security-on-the-internet","category-technology","category-wifi-en","tag-byod-en","tag-cloud-en","tag-cloud-en-2","tag-cloud-computing-en","tag-companies","tag-critical-infrastructures","tag-cybersecurity","tag-cybersecurity-trends","tag-esferize-en","tag-internet-of-things","tag-iot-en","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity: Trends for 2017 - Esferize<\/title>\n<meta name=\"description\" content=\"Some 2017 cybersecurity trends: Threats now extend to mobile, IoT devices or even the cloud.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: Trends for 2017 - Esferize\" \/>\n<meta property=\"og:description\" content=\"Some 2017 cybersecurity trends: Threats now extend to mobile, IoT devices or even the cloud.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"Esferize\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-15T13:41:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-07T15:10:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esferize.com\/wp-content\/uploads\/2018\/06\/ciberseguridad-2017_esferize.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"esferize\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"esferize\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/\"},\"author\":{\"name\":\"esferize\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/9137a26404c991f5612837aacf59c0a3\"},\"headline\":\"Cybersecurity: Trends for 2017\",\"datePublished\":\"2016-11-15T13:41:27+00:00\",\"dateModified\":\"2021-09-07T15:10:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/\"},\"wordCount\":534,\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/ciberseguridad-2017_esferize.jpg\",\"keywords\":[\"BYOD\",\"cloud\",\"Cloud\",\"Cloud Computing\",\"Companies\",\"Critical infrastructures\",\"cybersecurity\",\"Cybersecurity trends\",\"Esferize\",\"Internet of Things\",\"IoT\",\"Security\"],\"articleSection\":[\"Big Data\",\"Cloud\",\"Cybersecurity\",\"Internet\",\"IoT\",\"Security on the Internet\",\"Technology\",\"WIFI\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/\",\"name\":\"Cybersecurity: Trends for 2017 - Esferize\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/ciberseguridad-2017_esferize.jpg\",\"datePublished\":\"2016-11-15T13:41:27+00:00\",\"dateModified\":\"2021-09-07T15:10:11+00:00\",\"description\":\"Some 2017 cybersecurity trends: Threats now extend to mobile, IoT devices or even the cloud.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/ciberseguridad-2017_esferize.jpg\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/ciberseguridad-2017_esferize.jpg\",\"width\":1024,\"height\":683,\"caption\":\"Ciberseguridad: Las tendencias para 2017\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/cybersecurity-trends-2017\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: Trends for 2017\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"name\":\"Esferize\",\"description\":\"Connect to the future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\",\"name\":\"Esferize Comunicaciones S.L.\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"width\":453,\"height\":100,\"caption\":\"Esferize Comunicaciones S.L.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/esferize-comunicaciones\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/9137a26404c991f5612837aacf59c0a3\",\"name\":\"esferize\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g\",\"caption\":\"esferize\"},\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/author\\\/esferize\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity: Trends for 2017 - Esferize","description":"Some 2017 cybersecurity trends: Threats now extend to mobile, IoT devices or even the cloud.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity: Trends for 2017 - Esferize","og_description":"Some 2017 cybersecurity trends: Threats now extend to mobile, IoT devices or even the cloud.","og_url":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/","og_site_name":"Esferize","article_published_time":"2016-11-15T13:41:27+00:00","article_modified_time":"2021-09-07T15:10:11+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2018\/06\/ciberseguridad-2017_esferize.jpg","type":"image\/jpeg"}],"author":"esferize","twitter_card":"summary_large_image","twitter_misc":{"Written by":"esferize","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/#article","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/"},"author":{"name":"esferize","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/9137a26404c991f5612837aacf59c0a3"},"headline":"Cybersecurity: Trends for 2017","datePublished":"2016-11-15T13:41:27+00:00","dateModified":"2021-09-07T15:10:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/"},"wordCount":534,"publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"image":{"@id":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2018\/06\/ciberseguridad-2017_esferize.jpg","keywords":["BYOD","cloud","Cloud","Cloud Computing","Companies","Critical infrastructures","cybersecurity","Cybersecurity trends","Esferize","Internet of Things","IoT","Security"],"articleSection":["Big Data","Cloud","Cybersecurity","Internet","IoT","Security on the Internet","Technology","WIFI"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/","url":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/","name":"Cybersecurity: Trends for 2017 - Esferize","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/#primaryimage"},"image":{"@id":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2018\/06\/ciberseguridad-2017_esferize.jpg","datePublished":"2016-11-15T13:41:27+00:00","dateModified":"2021-09-07T15:10:11+00:00","description":"Some 2017 cybersecurity trends: Threats now extend to mobile, IoT devices or even the cloud.","breadcrumb":{"@id":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/#primaryimage","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2018\/06\/ciberseguridad-2017_esferize.jpg","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2018\/06\/ciberseguridad-2017_esferize.jpg","width":1024,"height":683,"caption":"Ciberseguridad: Las tendencias para 2017"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esferize.com\/en\/cybersecurity-trends-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.esferize.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: Trends for 2017"}]},{"@type":"WebSite","@id":"https:\/\/www.esferize.com\/en\/#website","url":"https:\/\/www.esferize.com\/en\/","name":"Esferize","description":"Connect to the future","publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esferize.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esferize.com\/en\/#organization","name":"Esferize Comunicaciones S.L.","url":"https:\/\/www.esferize.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","width":453,"height":100,"caption":"Esferize Comunicaciones S.L."},"image":{"@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/esferize-comunicaciones"]},{"@type":"Person","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/9137a26404c991f5612837aacf59c0a3","name":"esferize","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f66953701f5bf2c46cccb040020d9b0b9ab8daf3e9c85e663a53df18d6fd7170?s=96&d=mm&r=g","caption":"esferize"},"url":"https:\/\/www.esferize.com\/en\/author\/esferize\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/comments?post=5422"}],"version-history":[{"count":0,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5422\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media\/4972"}],"wp:attachment":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media?parent=5422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/categories?post=5422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/tags?post=5422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}