{"id":12873,"date":"2018-01-23T14:45:41","date_gmt":"2018-01-23T19:45:41","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=12873"},"modified":"2025-11-12T15:40:37","modified_gmt":"2025-11-12T20:40:37","slug":"malware-forecast","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/","title":{"rendered":"3 Things All Organizations Should Learn from the SophosLabs 2018 Malware Forecast"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12873\" class=\"elementor elementor-12873\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a03f994 e-flex e-con-boxed e-con e-parent\" data-id=\"a03f994\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54556b10 elementor-widget elementor-widget-text-editor\" data-id=\"54556b10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>WannaCry. NotPetya. KRACK. BadRabbit&#8211;with all the new friends we made in 2017, organizations have to wonder what the new year has in store in regard to cyber security. A meteoric rise in ransomware has the healthcare industry on its toes. Corporate email breach rates are soaring. Surely there must be someone that can help us make sense of it all!<\/p><p>Well, Sophos can. A few months ago SophosLabs released its <a href=\"https:\/\/www.sophos.com\/en-us\/en-us\/medialibrary\/PDFs\/technical-papers\/malware-forecast-2018.pdf?la=en\" target=\"_blank\" rel=\"noopener noreferrer\">2018 Malware Forecast<\/a>. In this week\u2019s blog post, we\u2019ll look at the data, the predictions, and what business owners should take away from the research. <strong>Ready to get secure and stay secure in 2018?<\/strong> Keep reading to learn how you can pull it off.<\/p><h2>3 Key Points of the SophosLabs Malware Forecast<\/h2><h3>1. Ransomware-as-a-Service is the New Normal<\/h3><p>The real boogeyman in the world of cyber security is no longer individual hackers, but the toolkits and custom code they distribute. The Dark Web is littered with DIY exploit kits and pre-built ransomware payloads just waiting to be aimed and fired, for a price. Any Joe Shmoe off the street can bring a hospital campus to a grinding halt, even if they can\u2019t tell a secure socket from an electrical socket. Ransomware-as-a-Service is an all-inclusive heist-in-a-box that even low-tier baddies can use to separate your organization from its wallet.<\/p><p style=\"text-align: left;\">Just how commodified has ransomware become? Well, why not <strong>watch the world&#8217;s first commercial for a ransomware toolkit<\/strong>?<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81b2d6c elementor-widget__width-initial elementor-widget elementor-widget-video\" data-id=\"81b2d6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/yjtOaZaVvdU&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14afe89 elementor-widget elementor-widget-text-editor\" data-id=\"14afe89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>What It Means for You<\/strong><\/h4><p>More attempts, spam and danger lurking around every corner. Sure, these DIY exploiters may not have the expertise or dedication that hackers of old once touted, but <strong>cybercrime in 2018 is a numbers game<\/strong>. Expect to see the total number of attempted attacks rise as ransomware-as-a-service kits multiply and the entry threshold for cyber criminals&#8217; lowers.<\/p><h3>2. Windows is Still Vulnerable<\/h3><p>As the author of the report states, \u201cthe Windows threat landscape hasn\u2019t changed much in the past year\u2026\u201d Realistically, that\u2019s no better news than claiming the yapping dog next door hasn\u2019t been barking much louder than usual. One important trend that SophosLabs reported was an increased concentration of attack payloads nested in Microsoft Office applications. Droppers like these execute macros inside Windows documents to deliver their payload, turning innocent-looking files into landmines. If anything, these improvements in the world of Office exploits translate into shorter attack time frames and more efficient exploits.<\/p><h4><strong>What It Means for You<\/strong><\/h4><p>Like years past, the most likely attack vector against your organization in 2018 will be an attachment in your inbox. However, expect phishing attempts that are more deceptive, more persuasive, and, should you fall victim, more unforgiving. Tag teamed with a blossoming ransomware-as-a-service sector, and we can expect Windows exploits that are deployed more dynamically than ever. The turnaround time is shrinking between when new vulnerabilities are discovered and attack payloads being built to exploit them.<\/p><h3>3. Cybercriminals As Opportunistic Hunters<\/h3><p>The bad guys are wasting less of their time on targets that won\u2019t pay up. That\u2019s bad news for those of us that don&#8217;t have the luxury of choice. The healthcare, government, and education industries will have inescapable targets looming over their heads throughout 2018. Healthcare in particular is already attacked more frequently than any other sector. Each instance of ransomware attack is an experiment. Criminals are learning who will convert into a sale and which targets are least prepared.<\/p><h4><strong>What It Means for You<\/strong><\/h4><p>Cybercrime is a growing industry and like any budding industry, they are piecing together their target audience and exploring strategies to shorten their \u201csales funnel.\u201d With ransomware, that&#8217;s accomplished by targeting critical infrastructure, medical records, and sensitive financial information. If your industry touches on those goalposts, you\u2019ve probably made it onto the bad guys\u2019 shortlist.<\/p><h2>How Can I Prepare for 2018?<\/h2><p>Adware, spyware, and viruses are all very much real and salient worries. But let\u2019s not kid ourselves about who the big bad final boss is on this level: <strong>ransomware<\/strong>. Any industries that could find themselves staring down the barrel of a custom-design exploit kit should be preparing for that possibility by putting preventative measures in place. Step one is as easy as learning as much as possible about ransomware, so why not hop over to our article &#8220;<a href=\"https:\/\/www.firewalls.com\/blog\/ransomware-warfare-protect-files-from-hostage-takers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware Warfare: How to Protect Your Files From Hostage Takers<\/a>&#8221; to brush up on your safety basics?<\/p><p><a href=\"https:\/\/www.sophos.com\/en-us\/products\/intercept-x.aspx?id=00130000019KGZ4\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos Intercept X<\/a> is a powerful weapon that most organizations should be adding to their arsenal. Intercept X is designed to run alongside any other endpoint applications on your system, so most network environments will welcome it. Intercept X is built to go toe-to-toe with zero-day threats because <strong>Sophos analyzes threats based on behavior rather than known signature<\/strong>. Behavior-based scanning ensures that even if an attack has never been documented before, it\u2019s still going to get the ax if it walks like ransomware, talks like ransomware, and smells like ransomware. In an era of bespoke and rapid-deployment ransomware, we can no longer rely on only fighting the enemies we&#8217;re familiar with.<\/p><p>However, the most impressive feature of Intercept X is its ability to literally roll back damage from ransomware that lands on your system. <strong>Even if ransomware makes it onto your network and manages to encrypt a few files, Intercept X will be able to shut the attack down, restore your files, and reverse the damage right before your eyes<\/strong>. In fact, you can watch it demonstrated in this one-minute video:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38b6f64 elementor-widget__width-initial elementor-widget elementor-widget-video\" data-id=\"38b6f64\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;video_type&quot;:&quot;vimeo&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<iframe class=\"elementor-video-iframe lazyload\" allowfullscreen allow=\"clipboard-write\" title=\"vimeo Video Player\" data-src=\"https:\/\/player.vimeo.com\/video\/180040392?color&amp;autopause=0&amp;loop=0&amp;muted=0&amp;title=1&amp;portrait=1&amp;byline=1#t=\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" data-load-mode=\"1\"><\/iframe>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e79ad01 elementor-widget elementor-widget-text-editor\" data-id=\"e79ad01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Remember, an organization is only as secure as its employees make it. Human error will occur. Honest mistakes happen. But if the worst happens, Intercept X will be there to clean up.<\/p><p style=\"text-align: center;\"><a class=\"wpex-theme-button red\" href=\"https:\/\/www.sophos.com\/en-us\/products\/intercept-x.aspx?id=00130000019KGZ4\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-size: 18px;\">Learn more about Intercept X or take it for a FREE 30-day trial<\/span><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Step into our briefing room and we&#8217;ll get you up to speed on 2018&#8217;s malware forecast on all things ransomware.<\/p>\n","protected":false},"author":5,"featured_media":12878,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286,594],"tags":[],"class_list":["post-12873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-sophos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 Takeaway from the Sophos 2018 Malware Forecast<\/title>\n<meta name=\"description\" content=\"Step into our briefing room and we&#039;ll get you up to speed on 2018&#039;s malware forecast on all things ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 Takeaway from the Sophos 2018 Malware Forecast\" \/>\n<meta property=\"og:description\" content=\"Step into our briefing room and we&#039;ll get you up to speed on 2018&#039;s malware forecast on all things ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-23T19:45:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-12T20:40:37+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/01\/Storm2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1028\" \/>\n\t<meta property=\"og:image:height\" content=\"704\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"3 Things All Organizations Should Learn from the SophosLabs 2018 Malware Forecast\",\"datePublished\":\"2018-01-23T19:45:41+00:00\",\"dateModified\":\"2025-11-12T20:40:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/\"},\"wordCount\":967,\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/01\/Storm2.png\",\"articleSection\":[\"Cybersecurity\",\"Sophos\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/\",\"name\":\"3 Takeaway from the Sophos 2018 Malware Forecast\",\"isPartOf\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/01\/Storm2.png\",\"datePublished\":\"2018-01-23T19:45:41+00:00\",\"dateModified\":\"2025-11-12T20:40:37+00:00\",\"description\":\"Step into our briefing room and we'll get you up to speed on 2018's malware forecast on all things ransomware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#primaryimage\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/01\/Storm2.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/01\/Storm2.png\",\"width\":1028,\"height\":704,\"caption\":\"ransomware forecast 2018 from sophoslabs shows that ransomware as a service and windows exploits will be biggest cyber security threats\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.firewalls.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 Things All Organizations Should Learn from the SophosLabs 2018 Malware Forecast\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#website\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\/\/www.firewalls.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/firewallscom\",\"https:\/\/x.com\/firewallscom\",\"https:\/\/www.linkedin.com\/company-beta\/1439857\/\",\"https:\/\/www.youtube.com\/user\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\/\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Takeaway from the Sophos 2018 Malware Forecast","description":"Step into our briefing room and we'll get you up to speed on 2018's malware forecast on all things ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/","og_locale":"en_US","og_type":"article","og_title":"3 Takeaway from the Sophos 2018 Malware Forecast","og_description":"Step into our briefing room and we'll get you up to speed on 2018's malware forecast on all things ransomware.","og_url":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2018-01-23T19:45:41+00:00","article_modified_time":"2025-11-12T20:40:37+00:00","og_image":[{"width":1028,"height":704,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/01\/Storm2.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"3 Things All Organizations Should Learn from the SophosLabs 2018 Malware Forecast","datePublished":"2018-01-23T19:45:41+00:00","dateModified":"2025-11-12T20:40:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/"},"wordCount":967,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/01\/Storm2.png","articleSection":["Cybersecurity","Sophos"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/","url":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/","name":"3 Takeaway from the Sophos 2018 Malware Forecast","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/01\/Storm2.png","datePublished":"2018-01-23T19:45:41+00:00","dateModified":"2025-11-12T20:40:37+00:00","description":"Step into our briefing room and we'll get you up to speed on 2018's malware forecast on all things ransomware.","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/malware-forecast\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/01\/Storm2.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2018\/01\/Storm2.png","width":1028,"height":704,"caption":"ransomware forecast 2018 from sophoslabs shows that ransomware as a service and windows exploits will be biggest cyber security threats"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/malware-forecast\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"3 Things All Organizations Should Learn from the SophosLabs 2018 Malware Forecast"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=12873"}],"version-history":[{"count":26,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12873\/revisions"}],"predecessor-version":[{"id":26700,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/12873\/revisions\/26700"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/12878"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=12873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=12873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=12873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}