2016 Cybersecurity Year in Review: The Year Everything Changed
2016 is wrapping up, and from a cybersecurity perspective, it was a year that changed everything. The breaches got bigger, the threats got more sophisticated, and the consequences got more real. Let's walk through what happened, what we learned, and what it means for 2017.
The Major Events
Q1: Ransomware Goes Mainstream
February: Hollywood Presbyterian Medical Center pays $17,000 in Bitcoin to ransomware attackers after 10 days of operating on paper. It wasn't the first hospital ransomware attack, but it was the one that made everyone pay attention.
March: MedStar Health, a major D.C.-area health system, gets hit. Ten hospitals affected. Ransomware is now officially a healthcare epidemic.
Q2: Breaches and Leaks
April: The Panama Papers drop. 11.5 million files from law firm Mossack Fonseca. The biggest document leak in history, caused by basic security failures.
May: LinkedIn reveals the 2012 breach was actually 117 million accounts, not 6.5 million. Equifax loses 431,000 tax records. The Depp-Heard divorce puts digital evidence in the spotlight.
June: SWIFT banking system exploited again. $10 million stolen from a Ukrainian bank.
Q3: Scale and Sophistication
August: The Shadow Brokers leak NSA hacking tools. Government-grade cyber weapons are now available to anyone.
September: Yahoo announces 500 million accounts compromised. At the time, the largest breach in history.
Q4: The Internet Fights Back (and Loses)
October: The Mirai botnet, powered by hacked cameras and DVRs, takes down DNS provider Dyn. Half the internet goes offline. Twitter, Netflix, Reddit, and thousands of other sites are unreachable.
November: Election cybersecurity dominates headlines. DNC email hack attributed to state-sponsored attackers.
December: Yahoo announces a SECOND breach, this one from 2013, affecting 1 billion accounts (later revised to 3 billion, every Yahoo account ever created).
By the Numbers
- 3+ billion accounts compromised in Yahoo breaches alone
- $1.7 billion lost to business email compromise scams
- $209 million in reported ransomware payments (actual figure likely much higher)
- $355 average cost per compromised healthcare record
- 4,149 data breaches reported, exposing 4.2 billion records
What We Learned
1. Nobody is too big (or too small) to be a target. Yahoo, the DNC, the NSA, and small dental practices all got hit. Size doesn't matter. Security does.
2. Basics matter more than anything. The biggest breaches of 2016 weren't caused by sophisticated zero-day exploits. They were caused by phishing emails, unpatched software, weak passwords, and missing two-factor authentication.
3. IoT is the next frontier. The Mirai botnet showed that internet-connected devices are weapons when left unsecured. And we're adding billions more every year.
4. Disclosure timelines are unacceptable. Yahoo sat on breaches for years. The gap between breach and disclosure needs to shrink dramatically.
5. Backups save businesses. Every ransomware story we covered had the same resolution: practices with good backups survived, practices without them suffered.
Looking Ahead to 2017
Expect more targeted ransomware, more sophisticated phishing, increased HIPAA enforcement, and the continued growth of IoT threats. But also expect better tools, better awareness, and more organizations taking security seriously.
2016 was a wake-up call. Let's make sure we actually wake up.