Cybercrime and ‘Internet of Threats’ to cost businesses over $2T by 2019

Cybercrime and ‘Internet of Threats’ to cost businesses over $2T by 2019

By eeNews Europe

The research has found that the majority of these breaches will come from existing IT and network infrastructure. While new threats targeting mobile devices and the IoT (Internet of Things) are being reported at an increasing rate, the number of infected devices is minimal in comparison to more traditional computing devices.

The report also highlights the increasing professionalism of cybercrime, with the emergence of cybercrime products (i.e., sale of malware creation software) over the past year, as well as the decline in casual activist hacks. Hacktivism has become more successful and less prolific — in future, Juniper expects fewer attacks overall, but more successful ones.

‘Currently, we aren’t seeing much dangerous mobile or IoT malware because it’s not profitable’, noted report author James Moar. ‘The kind of threats we will see on these devices will be either ransomware, with consumers’ devices locked down until they pay the hackers to use their devices, or as part of botnets, where processing power is harnessed as part of a more lucrative hack. With the absence of a direct payout from IoT hacks, there is little motive for criminals to develop the required tools.’

Other key findings include:

  • Nearly 60% of anticipated data breaches worldwide in 2015 will occur in North America, but this proportion will decrease over time as other countries become both richer and more digitised.
  • The average cost of a data breach in 2020 will exceed $150 million by 2020, as more business infrastructure gets connected.

The whitepaper – ‘Cybersecurity and the Internet of Threats’ – is available to download together with further details of the full research —

Related articles:
Stopping a new breed of hackers accessing unconnected computers or smartphones
Kaspersky Lab and BioNyfiken team up to connect human bodies to the Internet
Better internet security could come from quantum steering
End-to-end security for the Internet of Things
Cloud security software to see rapid growth
Wedge Networks, Spirent demonstrate NFV, security and scalability of open cloud