Check Point SA’s sales manager, Doros Hadjizenonos, looks back at how accurate security forecasts for 2013 proved to be, and gives his predictions for the year ahead.

With the end of 2013 approaching, and in light of the signing into law of the recent Protection of Personal Information Bill, 2013, we start looking forward to the coming year, to try and predict what lies ahead.

Check Point’s top five predicted security threats for 2013 were: social engineering, advanced persistent threats (APTs), internal threats, BYOD, and cloud. All five predictions were realised; especially internal threats, with Edward Snowden’s NSA security breach being among the biggest data leaks ever by an insider.

Like most IT security professionals, I really want my predictions not to come true: I would prefer organisations didn’t get hacked, infected by malware, or suffer data breaches. But by predicting the next wave of threats, we hope to help organisations stay on top of the evolving tactics and exploits that criminals will use to target them.

So here are my 14 predictions for 2014, covering 10 major security threats to businesses, followed by four ways in which defences will evolve.

*Social engineering – this isn’t a new threat, but it’s showing no sign of getting old. Social engineering using targeted emails remains the primary method for launching malware and phishing attacks on businesses.

* Internal threats – again, not a new threat, but it’s still a huge risk – as mentioned earlier in the case of the NSA breach by a trusted insider. Senior figures at the NSA have said only 20 of its staff should have had access to the classified data that was downloaded and released by Snowden. Trust is a precious commodity, and is all too easily exploited.

* Targeted malware campaigns – we can expect more highly sophisticated malware campaigns in 2014, aimed at stealing either money or intellectual property. And if neither can be stolen, criminals will simply extort money by hijacking or destroying data.

* Botnet bother – bots will continue to be a core attack technique, simply because they’re effective. Our 2013 Security Report analysed the networks of nearly 900 companies worldwide, and found 63% had bot infections. 70% of these bots communicated with their command centres every two hours. Bots are here to stay.

* BYOD = big bills – we may be a little bored of hearing about BYOD, but it’s still a big problem. We surveyed 800 businesses globally in 2013, and 79% had a costly mobile security incident in the past 12 months. 42% said the incident cost over R1-million, and 16% put the cost at over R5-million.

* Attacks on state interests and infrastructure – state-backed cyber-snooping and attacks will continue on all sides of the geopolitical spectrum, targeting military, government and commercial interests.

* Web site wars – financial institutions have been battling waves of distributed denial of service (DDoS) attacks over the past two years. This will spread to a wider range of public sites, aimed at causing downtime and disruption. We will also see more complex, multi-vector attacks on websites that combine DDoS with account tampering and fraud.

* Customer data theft – customer information is still a prize target, as the high-profile hacks which stole tens of millions of users’ credentials from Adobe, Evernote and LivingSocial shown this year. Any organisation which holds volumes of customer data is a target for hackers.

* Anti-social media – hijacking Twitter users’ accounts is commonplace: in April, a hacked Associated Press Twitter account issued a bogus report claiming that the White House had been bombed, causing the Dow Jones index to fall 150 points in minutes.

Hijacking will start to spread to more business-oriented social media sites, with criminals starting to hijack LinkedIn accounts to help them profile or phish other users to mount attacks.

* Smart home invasion – as the Internet of Things develops, and more IP-based household appliances are introduced (smart TVs, personal networks etc), criminals will look for weaknesses that can be exploited by hooking into these systems to gain personal information – such as your daily living patterns.

Although these 10 threat predictions seem bleak, security protections against threats continue to evolve, too.

Here are my four predictions of how defences will develop in 2014.

* Unifying layers of security – single-layer security architectures or multi-vendor point solutions no longer offer effective protection to organisations. We will see more and more vendors attempting to offer unified, single-source solutions through development, partnership and acquisition. This is already happening, and we will see increasing collaboration to fight threats.

* Big data – big data will give tremendous opportunities for threat analytics, enabling identification and analysis of patterns relating to past and emerging threats. Vendors will increasingly integrate these analytics capabilities into their solutions; and enterprises will also invest in their own analytics to help with decision-making through enhanced context and awareness of threats to their business.

* Threat collaboration – security vendors and customers realise that no single organisation can have a complete picture of the threat landscape. Collaborative sharing of threat intelligence is needed to maintain up-to-date protection. This will drive partnerships between security vendors and end-users to augment unified security solutions with the latest intelligence to coordinate the fight against threats.

* Cloud consolidation – the cloud will be the platform that supports and enables big data analytics and collaborative sharing of threat intelligence, enabling vendors’ unified security solutions to deliver enhanced protection to organisations.