Skip Ribbon Commands
Skip to main content

What to watch out for in IT Security for 2017

By John Clayton - IT Management Consultant and Cybersecurity Specialist at NNIT A/S

It’s a well-known fact that IT Security never stands still, and just when we think we have got things under control, new threats and technology trends emerge leading to new vulnerabilities that require our renewed energies.

In this NNIT Security Insights article, I take a look into some of the trends that we are likely to see more of in the coming year – some of these are existing trends that are likely to develop further, whilst others are completely new.

The IT Security Trends for 2017

1. EU GDPR Preparations: The EU General Data Protection Regulation intends to strengthen and unify data protection for individuals within the European Union (EU), and it also addresses export of personal data outside the EU. This regulation will enter into application on the 25th May 2018, and with a risk of fines of up to 4% of annual turnover, organizations will be putting this item at the top of their lists in 2017, in order to ensure they are fully prepared to be in compliance as we move into 2018. 

2. Identity & Access Management: The implementation of Identity & Access Management (IAM) solutions is expected to continue gaining momentum as we move through 2017, especially to assist organizations as they implement technical controls to help prepare for the coming EU GDPR. We discussed it in a previous article here.

3. Securing Applications: Similarly, the coming EU GDPR and the substantial fines it imposes on data leaks is expected to cause an increased focus to protect applications such as websites to prevent data breaches in 2017.

4. Ransomware: Ransomware is not new, but it continues to evolve, largely due to its ability to generate large revenues for criminal actors. It is morphing from its previous focus of random attacks on home user PCs to more targeted organizational attacks, and attacks on Internet of Things devices and Critical National Infrastructure. We discussed it in previous articles here and here.

5. Attacks on the Internet of Things: The trend for more of our devices to become connected to the Internet is expected to continue for the foreseeable future, and this opens them up to attacks from Internet-based criminal actors. Smart TVs, medical devices and our cars are just a few examples that are increasingly becoming Internet-connected.

6. Large Scale Cyber-Attacks: The number of large scale cyber-attacks on organizations and Governments is expected to continue, as criminal actors look to steal valuable information for monetary gains or expose information for ethical reasons.

7. The rise of the CCO: The new role of Chief Cybercrime Officer (CCO) is likely to make an entrance in large organizations soon, with focus on preparing an organization for possible cyber-attacks and leading an organization through the various activities should an actual breach occur.

Do you have anything to add? Do you think anything is missing? Please let me know and share your comments!

About NNIT Security Insights

NNIT Security Insights is a regular column where prominent NNIT IT security advisors share their thoughts on current and future IT security challenges and how to deal with them.

NNIT has its own Computer Emergency Response Team (CERT). If lightning strikes, we have the necessary competencies in-house to respond and assist. We have also developed a range of services that can help businesses to achieve the right level of security protection to protect the business from financial and reputational damage. 

You are welcome to contact us at if you want to know more about how NNIT can help your business increase its information security level.



Helge Skov Djernes+45 3075 8868 hfsd@nnit.comInformation Security Management Consultant Skov Djernes



NNIT Security Insights Security Insights
Risky Business? Business?
​Ransomware 101​Ransomware 101
Cybersecurity Awareness – The First Line of Defense​ Awareness – The First Line of Defense​
The Fine Art of Aligning Business Strategy and Information Security Strategy Fine Art of Aligning Business Strategy and Information Security Strategy
​Privacy – why it is worth fighting for​Privacy – why it is worth fighting for
​The C.I.A. of application security!​The C.I.A. of application security!
Migrate to Cloud Services without Jeopardizing Security and Compliance to Cloud Services without Jeopardizing Security and Compliance
​​​Building a sustainable defence: How to secure your operational technology (OT) environment​​​​Building a sustainable defence: How to secure your operational technology (OT) environment​
How to Keep Industrial Computer Systems (ICS/SCADA) Running in an Age of Cybercrime? to Keep Industrial Computer Systems (ICS/SCADA) Running in an Age of Cybercrime?