1. Cyber-espionage- When the government access the information through internet for their use
2. Internet of things- Increases the possibilities for obtaining personal details of users as the devices will be connected to the internet
3. Ransom-ware- Enhances the infection to the computer to restrict users from accessing their information
4. Insecure Passwords- Easily obtainable passwords
5. Increase in cyber theft- Financial information theft through internet.
Hackers use viruses and spyware to infiltrate computers and mobile devices to steal data, such as passwords, Social Security numbers and account information. They then can use that information to access your accounts and drain them, run up debt under your name or steal your entire identity.
Using weak passwords. If you’re using simple passwords for your accounts so you can remember them, you’re making it easy for hackers to figure them out, too. Irvine recommends creating passwords with a minimum of ten characters that include numbers, symbols and upper- and lowercase letters.
Using multiple credit cards to make purchases online. The more credits cards you use, the more chances you give hackers to access your account information and use your entire credit limit, Irvine says. He recommends using a payment service, such as PayPal, to make all of your online purchases.
Revealing too much on social networks. When you announce your birthday, your address and even your pet’s name on Facebook or other social network, you’re giving identity thieves personal information they can use to tap your accounts. So resist the urge to reveal too much online.
Creating user IDs on Web sites. Many retail sites offer customers the opportunity to create password-protected accounts with their billing information to make it easier for them to make purchases online.
AVOIDING/ MITIGATING HACKERS INTENTIONS
Keeping software up to date.
Don’t delay updating your anti-virus software or other security applications.
Having an incident response plan and practice it.
Just like a fire drill, having a plan of action for responding to a cyber incident is crucial.
Pick up the phone.
Verify financial requests and confirm details by phone instead of relying on email to initiate or complete any financial transaction – whether you are dealing with your bank, vendors, clients, or employees.