Symantec Pacific Predictions for 2014
1.The Big Data Bang is here: As social media and mobile devices proliferate, we’re in the midst of an information explosion. Every minute, we
create, store and access complex data at an unprecedented scale; in fact 90 percent of the world’s data was created in the last two years. Many companies project that their information will grow at an
incredible 60 percent to 70 percent within one year. This free flow of data has created immense opportunities. But it’s also opened the doors to new risks.
As the Internet of Things, the cloud, real-time analytics and other technologies step out of our imaginations and into
our lives, so too do a host of sophisticated threats that we must address, or risk progress.
2.Closing the information management skills gap: With real time analytics and big data being seen as a competitive advantage for companies, we can expect to see a
skills deficit in these areas over 2014. With Gartner predicting that by 2015, 25 percent of companies will have a CDO managing their digital goals, and McKinsey and Company’s annual global survey released in September, Bullish on Digital, showing 30 per cent already have a CDO on their executive team, it is clear that data related skills will be in high
demand and companies that are desperate to hire people with these specialised skills, will pay premium dollars to plug
the gaps. The additional challenge for New Zealand is the international poaching of talent and making sure we can secure
the best people for this job at the right place and location.
3.Legislative and compliance issues take hold: Not only do companies need to stay ahead of the latest technology trends and events, but also legislative changes and
compliance issues. Most governments are playing catch up with the law when it comes to the digital revolution. In New
Zealand, the government is expected to table a draft of new privacy legislation very soon. This new legislation, which
will replace the 1993 Privacy Act, could include changes such as compulsory privacy breach notifications and the power
of the Office of the Privacy Commissioner to audit and enforce compliance. Also, as the Trans Pacific Partnership
negotiations progress, access to information and international patent legislation will remain an area of focus.
Legislative and compliance issues are also reaching the consumer – individuals need to care about encryption and privacy
law and what information is being used for this new frontier.
4.Understanding Software-Defined Data Centres (SDDC): The future data centre looks different from today’s. Heterogeneous and distributed data centres, information and
workloads everywhere, shared resources, abstraction of hardware from software, delivery as hybrid clouds, and velocity
of change. This new environment poses some new challenges – visibility, access control, aggregation of responsibility.
Future data centres need insights and real-time dynamics to mitigate risks. SDDC is another trend to watch as the
software-defined infrastructure becomes tangible. Many believe 2014 will be a year of education as customers come to
understand the benefits of software-defined anything – compute, networking and storage – and overcome any challenges
around trust and security.
5.Internet of Things comes of age: The Internet of Things is promising to drive productivity, improve business efficiency and spawn growth sectors in the
coming decades and New Zealand businesses are starting to think about how they can make use of a world that is highly
connected. Wearable computing is also exploding as leaps and bounds are made in hardware, entire operating systems,
graphics processors and security being baked into microprocessors. As usage models for the Internet of Things start to
emerge so too will hackers try to infiltrate these systems.
6.All things cybercrime and privacy related continue to be challenging: Whether it is ransomware, mobile cybercrime, app scams, exploiting niche social networks, corporate espionage or the
move from mass cyber threats to more sophisticated and targeted attacks, there is no doubt that cybercrime and privacy
will continue to be problematic for consumers and enterprises – both large and small. In 2014, people will finally begin
taking active steps to keep their information private. Scammers, data collectors and cybercriminals will not ignore any
social network, no matter how niche or obscure it is; the Internet of Things will become the Internet of Vulnerabilities
and mobile apps will prove that you can like yourself too much. More information on 2014 security predictions can be
found here: http://www.symantec.com/connect/blogs/2014-predictions-symantec-0
7.Enterprise app stores become the norm: By 2014, there will be more than 70 billion mobile app downloads from app stores every year. As organisations embrace
employees bringing their own applications to work to complete day to day tasks, by 2014, most organisations will deliver
mobile apps to workers via private application stores. In addition, we will see more enterprises focus on application
wrapping where you can choose whatever app you want, but you need to give it to IT to wrap a security layer around it
and this way you don’t need to generate the app, just secure and license it.
8.Authentication goes mainstream: How you prove you are you is exploding. In particular we expect to see an increase in the use of risk-based behavioural
analysis and user profiling as a more frequent form of authentication in 2014 and the introduction of biometrics in the
iPhone is only the tip of the iceberg. However we’re not anticipating that biometrics will be mainstream for some time
as it still has some challenges around storing biometric data and privacy. Multi-factor authentication will become the
norm and passwords will no be longer the sole form of the authentication for users.
9.Distributed data causes confusion and frustration amongst consumers: As New Zealanders become multi-device consumers, keeping track of where their data resides will continue to cause them
confusion and frustration. As data is important than the device, consumers are struggling to manage their data across
multiple devices and keep their information backed up so that it can be recovered if lost or stolen. This fragmented
approach to data retention is leaving consumers exposed to cybercriminals, confused about their privacy and frustrated
about having to spend more time managing their data across multiple devices and platforms.
10.3D printing offers another vector for crime: As 3D printing becomes more affordable and highly available, we expect that cybercriminals will look to exploit 3D
printing for piracy. We anticipate blueprints of valuable designs will be a target for cybercriminals as 3D printing
becomes more mainstream.