Looking Ahead – Emerging Trends in Web Security for 2016

Thanks to the advent of the Information Age, our lives have been made a lot easier when it comes to compiling, aggregating, and analyzing data. Unfortunately, with that great privilege comes the great responsibility of ensuring that information systems are secure enough to withstand an attack from unethical hackers who seek to cause mayhem, steal data, and/or commit industrial espionage.

In 2016, there will be noticeable trends emerging in web security. Here are a few of them.

Mobile Security Will Gain More Focus

Thanks to the Bring Your Own Device (BYOD) concept, many employers are allowing employees to connect their own mobile devices to company servers. That makes life easier for the employee, because one device can be used for everything. It also boosts the company’s bottom line because it reduces expenses related to equipment purchases.

However, there’s a trade-off with BYOD. Many people don’t secure their mobile devices as well as they should. As a result, people who gain access to an employee’s mobile device might also gain access to company resources.

In 2016, look for the emergence of companies that specialize in BYOD security for businesses. It’s likely that many of those companies are going to set financial records in the new year.

Multi-Factor Authentication Will Gain Traction

Although your password might be very secure because it’s 14 characters long, includes three symbols, two numbers, and a mix of upper- and lower-case characters, your employer might still not be satisfied. That’s especially true if you work remote.

In 2016, expect to see an increased adoption of multi-factor authentication. That’s a method of logging on to secure systems that requires not just a password, but also some other security measure.

For example, some mutli-factor logons require a digital token to be used in addition to the password. A digital token is typically a number generated by a device that fits on your key chain. You press the button and it gives you a number that expires in 30 seconds or so. You’ll need to use that number in addition to your password to logon to the system. That way, a hacker who has your password can’t logon unless he or she has the token generator from your key chain.

Some multi-factor logins will go the extra mile from there and require biometric identification in addition to the other two factors. We’ve officially become a science fiction movie.

Concerns About Outsourced Code

With the threat of data breaches becoming ever more prevalent, some CIOs might start to consider the possibility that some custom-made software has a back door that can be exploited for hacking purposes.

Remember, companies often outsource their development efforts to save money. However, those outsourced companies could employ unscrupulous individuals as easily as any home-grown shop. The problem is even worse when outsourced contractors have produced software with thousands or tens of thousands of lines of code.

Look for IT management to recommend an “overview” of outsourced code in 2016 to ensure, as much as possible, that it’s free of back door threats.

Big Data Is a Big Headache

IT professionals everywhere love the concept of “big data.” That’s an industry buzz-phrase for a huge database that’s holds massive amounts of data and is used for decision making purposes.

Unfortunately, all that data is a treasure trove of information for unethical hackers. It was unsettling to a lot of American consumers when a hacker gained access to Anthem’s database and the information it held on as many as 80 million Americans. That data repository is what hackers would call a “target-rich environment.”

Look for CIOs to pay special attention to big data security in 2016 as they attempt to minimize threats of a data breach.

A High Demand for Information Security Professionals

If you’re contemplating a career change in IT, give serious thought to becoming an information security professional. It’s very likely that the demand for people who know how to minimize IT risks and put in place proactive measures to offset attacks will be in high demand in 2016 and the years following.

Data security will continue to be a high priority item for upper management in 2016. Too many companies have received bad press because they allowed hackers to gain access to their systems. Now, executives realize that cyber security is just one of many costs of doing business.