What Does Cybersecurity Look Like in 2018?


Bitcoin, the General Data Protection Regulation in Europe and the Internet of Things (IoT) are recent developments that will present security professionals with new challenges in 2018. That’s in addition to the usual challenges like malware, DDoS attacks and database thefts that appear in headlines weekly.

So what will 2018’s top cybersecurity challenges be? Here are the cybersecurity industry’s predictions:

IoT (Internet of Things)

The IoT (Internet of Things) is composed of all connected devices. Devices like the new fridge that has bluetooth video technology so you can check and see if you have milk left while at the grocery store all the way to baby monitors enabled with connectivity so you can check on your children from your phone. These connected devices are expansive and creating a massive pool of data. This potentially leaves every aspect of your everyday life accessible to anyone, anywhere, in seconds.

Vulnerabilities have already been reported in voice-activated personal assistants, and attackers have been turning on smart phone microphones and cameras without the owner’s knowledge for years. The Dyn hack of 2016 originated with printers, security cameras, residential gateways and baby monitors. This attack was a small glimpse into the future. Experts believe IoT will be the entry point for the next big cybersecurity threat.

New Angles of Attack

The recent attack to Intel processor chips was a small foreshadowing of threats to come. Attackers are becoming savvier and finding new ways to gain access to take control of devices. Experts predict there will be more activity by hackers around hardware-based attacks that go after the memory of the device. he says. Just like the Spectre and Meltdown attacks that took advantage of hardware flaws. Attackers utilized the hardware flaw to gain access to the device and get in to the software. Hardware vulnerabilities are harder to prevent and defend because they cannot be treated with conventional anti-malware practices. This may demand a whole new type of protection.

Password alternatives

Many smart phone makers have lately been showing off alternatives to passwords, such as biometric security controls (facial recognition and finger print scanning). While these technologies have some promise, they also create new targets for attackers. Cyber criminals will turn more attention to compromising systems that are supposedly super secure. With the Spectre and Meltdown attackers, hackers were given new ideas to attack the hardware of devices. Experts believe cyber criminals will find ways to exploit two factor validation and biometric security controls.

Emergency warning systems

Another new target for cyber criminals is emergency warning systems. Citizens in Hawaii and Japan have received false notifications of impending missile attacks. In both cases, human error was the culprit, but attackers will no doubt look for opportunities to create mayhem using the same channels. Imagine the security implications of being able to clear out entire neighborhoods or cities for burglars to mine.

Experts believe that the cybersecurity skills gap will continue to grow. Technology, and cyber criminals, are evolving faster than the cybersecurity industry. If the gap cannot be closed, or at least made smaller, attackers will gain access to sensitive data. Knowing this gap is growing, experts predict you will see more cybersecurity programs and degrees available. Cybersecurity is predicted to be a billion dollar industry and is not far off from its goal now.


One thing is clear: Securing ourselves and our organizations will only get more difficult this year. Datasmith’s team of engineers is ready to help protect your business. The best defense is creating a defense before being attacked. All too often we meet clients because they’ve fallen victim to a cyber threat. Build your cyber security now before it’s too late.