Current Trends In Cyber Security To Pay Attention To

With cyber crime on a meteoric rise, organisations in 2019 have to pay extra attention to cyber security trends such as increased cloud security, vulnerable Internet of Things networks, and phishing practices. Some estimates plcae the economic cost of cybrime as high as $45b in 2018, with no sign of a reduction in 2019. 

With this in mind, here are the cyber security trends that are must-know for any organisation this year.

Increased Attacks on Clouds
The rise of cloud computing as a go-to network infrastructure solution among an increasing number of businesses is barely news, but organisations using the cloud still pay insufficient attention to the safety of their data.

“As a cloud provider, we are aware of the rising number in DDoS attacks globally, as well as other attempts to breach the security of the cloud,” commented Vincentas Grinius, CEO of Heficed, a cloud, dedicated server and IP address provider. 

“Per usual, the more access points are available within a platform or data stored on the cloud, the higher the risk. If using third-party party solutions, enterprises need to pay extra attention to securing their data. When it comes to the cloud providers, their customers need to make sure that their provider is putting the effort in properly segmenting their servers, so that an attack on one customer wouldn’t compromise the whole platform.”

Vulnerability of IoT Networks
Another IT industry on a steady rise is the Internet of Things (IoT), which is forecasted to double by 2021 and reach 520 billion. Naturally, the growth of this magnitude is leading to a growing number of cybersecurity incidents due to an increasing number of poorly secured IoT devices. 

Apparently, it is not only the devices themselves who could fall victim to malicious activities, the networks that devices are connected to are increasingly at risk, too.

“From a network infrastructure point of view, every connected device might be a potential threat,” added Grinius. “Phones, smartwatches, even smart home appliances, among other devices, might be used as access points and compromise whole networks. ...If the users do not update their devices regularly and take other precautions, they could be responsible, even without knowing, for enabling potentially damaging network-wide cyber security threats.”

Dangers of Phishing
Widely discussed phishing attacks remain one of the most widespread threats to data safety in 2019. Currently there are estimates that 32% of all data breaches in 2018 were connected to phishing of some sorts. What is particularly challenging about phishing is that it is not only about cyber security solutions from the system’s side, a large part of phishing success is due to human error.

“To successfully tackle phishing, companies will have to invest in tools that monitor employees’ email traffic more closely, in making sure the systems used are always updated, and in cybersecurity training plans that would make employees aware of the threats and how to behave when confronted by them.... A training plan like this could include a phishing simulator and constantly updating the employees on new phishing methods,” finished Grinius.

With cyber-crime being such a lucrative niche for criminals worldwide, these trends are just a few of the many that might jeopardise enterprises. 

Regardless of how the cyber-threats will evolve in the future, businesses will need to invest additional resources in protecting their data.

Open Access Government

You Might Also Read: 

The Attack Surface Is Growing Faster Than Ever:

Five Tech Trends Driving Cyber Security:

 

 

 

« What Is The Internet of Things?
The GDPR Wake-Up Call Is Being Ignored By Business »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Software Factory

Software Factory

Software Factory develops custom-built high-performance software solutions and products for applications including industrial cyber security.

Honeynet Project

Honeynet Project

The Honeynet Project is a leading international non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC)

Bangladesh Computer Council (BCC) is a government body providing support for ICT related activities including formulating national ICT strategy and policy.

Beazley

Beazley

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

NDK InfoSec

NDK InfoSec

NDK InfoSec is a specialist Information Security and Cyber Security search firm. We're not just a security function in a larger generalist recruitment company.

FDD Center on Cyber and Technology Innovation (CCTI)

FDD Center on Cyber and Technology Innovation (CCTI)

The Foundation for Defense of Democracies is a nonprofit research institute focusing on foreign policy and national security. Ares of focus include cyber security and technology innovation.

SynSaber

SynSaber

SynSaber is a data collection, detection, and visibility solution that forms the foundation of industrial cybersecurity.

Coretelligent

Coretelligent

Coretelligent is a leading providers of Managed and Co-Managed IT, cybersecurity and private cloud services.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

ELLIO Technology

ELLIO Technology

ELLIO Technology is a cybersecurity company that reduces alert overload, improves incident response, and helps security teams target serious attackers who pose a real threat.

CERT.ar

CERT.ar

CERT.ar is the national Computer Emergency Response Team for the technical-administrative management of computer security incidents in the National Public Sector of Argentina.