In developing this report, we put our massive dataset to work, analyzing a number of unique (and not so unique) cybercrime trends from 2014. From noteworthy corporate attacks to the Internet of Things, 2014 was a busy year. Phishing trends continued to be prominent in the early part of the year; the first mobile ransomware debuted midyear; the third quarter saw massive attacks on businesses; and by the end of the year most of the world was checking their credit card and bank statements regularly to make sure that cybercriminals had not yet targeted their accounts as a result of the point-of-sale malware that found its way into the networks of Home Depot and other major retailers and enterprises. On top of it all, the world is getting ready for the Internet of Things, and the likelihood of 26 billion new Internet-connected devices by 2020.
Protecting the enterprise is the focus of this 2015 Yearbook. Attacks against business are growing in scope and scale, with cybercriminals targeting corporations of all sizes and profiles. We proudly feature in this report a number of new analytic techniques that will enable improved predictive capabilities to stop cybercriminals at the earliest stages of an attack.
We also examine both old and new trends in malware, including a highly dangerous version of the old Melissa virus that targets personally identifiable information, such as passwords and other sensitive corporate data. In the phishing section, we explore how social engineering is creating opportunity for cybercriminals to deploy advanced persistent threats against businesses. And in mobile malware we look at what the future holds for the increasing number of devices that we use to capture and hold sensitive information.
In closing, we take a brief look at the impact the industrial Internet of Things will have on today’s business from a cybercrime perspective, demonstrating the importance of cybersecurity to prevent criminals from using building management systems and other large-scale industrial Internet-connected systems as a means to target businesses.
2015 Energy Industry Cybersecurity Report
Strategic Cybersecurity: A Toolkit for Prioritizing, Coordinating, and Transforming Your Cybersecurity Program