Happy New Year from Decoding Security! We've predicted the top cybercrime trends of 2018 - listen to find out what threats you should look out for this year.

Improve your cybersecurity in 2018

The new year is a great time to consider your cybersecurity. Jessica and Ram have seen some trends leading up to 2018, and have some suggestions for how to improve your cybersecurity in the new year.

In The News

Leaked Ancestry.com data

https://threatpost.com/leaky-rootsweb-server-exposes-some-ancestry-com-user-data/129248/

Bad Passwords of 2017

https://motherboard.vice.com/en_us/article/paqd4m/too-many-people-are-still-using-password-as-a-password

New Year’s Resolutions

Cybersecurity Trend Predictions for 2018

Moving from ransomware to cryptocurrency miners
https://threatpost.com/crooks-switch-from-ransomware-to-cryptocurrency-mining/129229/

More regulation on cybersecurity

GDPR in EU - https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/

Small business cybersecurity resources - https://www.thune.senate.gov/public/index.cfm/2017/3/thune-introduces-legislation-to-improve-cybersecurity-resources-for-small-businesses

Cyberwar as a states issue

https://www.reuters.com/article/us-usa-cyber-northkorea/u-s-blames-north-korea-for-wannacry-cyber-attack-idUSKBN1ED00Q

Decline of password only authentication

https://www.csoonline.com/article/3237827/password-security/ready-for-more-secure-authentication-try-these-password-alternatives-and-enhancements.html

IoT attacks will increase

https://www.csoonline.com/article/3241240/security/salted-hash-ep-11-dyn-inc-ddos-anniversary-and-the-truth-about-the-reaper-botnet.html

Cybersecurity Resolutions

Use 2FA and password managers
Update your IoT wake words and use automatic firmware updates
Strengthen local wifi security to protect IoT devices
Turn off WPS on your router
Use firewalls and malware scanners on your business sites
Use SSL certificates
Delete unnecessary apps
For websites, this should include themes, plugins, add-ons, and modules
Get familiar with your file structure locally and on your website
Use a VPN
Prioritize security training
Learn to spot phishing
Learn to look for legit SSLs
Learn to review file structure
Have an incident response plan
Including a clear process for reporting malicious/suspicious activity
Backups and an access plan for them
Check your supply chain!

Final Tip

Watch out for your devices getting warmer or slower than usual; in the past this type of thing might have been due to buggy code or memory leaks, but nowadays it just might mean that someone installed a cryptocurrency miner and is profiting off of your device - and maybe killing your battery at the same time.