Five Risks That Will Define Cyber Security In 2020

2019 was a bad year for data security. By virtually every metric, it was the worst ever. Simply put, companies and their leaders must acknowledge and appreciate the growing consequences of a data breach. Unfortunately, there is no indication that 2020 will be any better.

While organisations are increasingly aware of the importance of cybersecurity, most are struggling to define and implement the required security measures. 

According to the Ponemon Institute’s / IBM 2019 Cost of a Data Breach Report, the average cost of a data breach climbed to nearly $4m, the highest amount on record. The number of data breaches increased by 54% in the first half of 2019, with nearly 4,000 publicly disclosed breaches during that time. In total, more than 4.1 billion records have been exposed this year. The number of data breaches in 202 will likely reach an all-time high this year. 

As more corporate infrastructure moves to the cloud, so will the focus of criminals. The good news and bad news following this trend is “conducting an attack will become harder and the actions of threat actors will become more sophisticated or more frequent, relying on chance rather than planning,” according to Kaspersky.

Driven by the high cost of sophisticated malware-based attacks, a rise in insider attacks are forecast for 2020.

“Direct attacks on infrastructure… is becoming much more expensive, requiring more and more skills and time for the attacker,” says Kaspersky. Increasingly, consumers and regulatory bodies are holding companies accountable for data breaches. Moreover, regulatory oversight like GDPR and CCPA are indicative of a growing regulatory trend that collectively raises the importance of data security in the year ahead.

For those charged with protecting company data, today’s expansive threat landscape can feel overwhelming, leading to increased levels of exhaustion and burnout. However, not all threats are equally prescient, as some are more likely and ominous than others.

Here Are Five Cyber Risks That Will Endanger Company Data In 2020

Insider Threats

While cybersecurity often elicits images of ominous criminals operating in backrooms, one of the most significant data security threats is likely lurking in the cubicle next door. Employees represent a significant threat to data integrity. Verizon’s 2019 Insider Threat Report estimates that insider threats cause more than a third of all data breaches. This threat category is uniquely nuanced, as things like intentional data theft, accidental sharing, and other data disclosure methodologies combine to create a robust threat that companies will need to address in 2020.

With a broad collection of employee monitoring and endpoint data loss prevention software available, every company can be equipped to defend against insider threats. As the consequences of a data breach continue to escalate, securing data against this known variable is a critical step to ensuring data integrity in the year ahead.

Phishing Scams

Despite their best efforts, phishing scams are inevitably making their way into employees’ inboxes, putting company data at risk each time. Unfortunately, the deluge of data available from previous data breaches is being repurposed to craft authentic-looking messages that are increasingly difficult to detect.

In the year ahead, increased personalisation and other deceptive tactics, like HTTPS encryption, will become normative, increasing the impetus for companies to provide awareness training to keep them aware of the threats landing in their inboxes.

Exposed Databases

Cloud computing is among the latest trends for enterprises and SMBs alike. As the vast majority of businesses move their operations to the cloud, this transition presents an opportunity for data exposure. This technological oversight can have severe consequences for data security. For instance, in November, a cybersecurity researcher discovered 1.2 billion records exposed on a single server, a surprisingly routine incident that underscores the threat of exposed databases to data security.

In 2020, companies need to understand that technological advancement can’t come at the expense of data security, and locking down these resources is often as simple as checking and rechecking that critical company data is password protected and not openly exposed to anyone able to locate it.

IT Admin Burnout

Cybersecurity professionals are faced with an incredible task. While they are defending against thousands of attacks every day, cybercriminals and internal bad actors only need to be successful once to inflict serious damage on a company. As a result, cybersecurity professionals are burning out and leaving the profession at a record rate. It’s estimated that 65% of IT professionals consider quitting their jobs, and a similar number are open to leaving the professional altogether.

This problem is endemic all the way to the highest levels of a company where chief information security officers have an average tenure of 18 to 24 months, which is, on average, more than four years less than other c-suite positions.This high-stress, high-turnover environment puts data at risk, as a lack of continuity and unfilled positions create an environment where hackers can thrive.

To assuage these concerns, companies need to prioritise automation as much as possible. In this way, they can protect their networks against insider and external threats without inundating cybersecurity staff with a continual deluge of risks to assess.

Wrong Priorities

Despite the overwhelming evidence that data loss is one of the greatest threats facing companies in the digital age, there is growing evidence that c-suite executives are failing to appreciate the risks. In a survey of Australian CEOs, only 6% recognised that they had experienced a data breach, while 63% of CISOs noted a data loss event. Similarly, only 26% of CISOs indicated that their company was ready to respond to a cyber threat, while 44% of CEOs thought their company was capable of a rapid recovery.

Taken together, these numbers are indicative of one of the most notable threats to data security: indifference.  However, for companies that identify and respond to the most probable data security threats, it can be a differentiating factor, allowing them to thrive in 2020 and beyond.

Please contact Cyber Security Intelligence as we can help your company with economic cyber employee training and cyber audits to significantly reduce your security risks.

Threatpost:         HelpNetSecurity:        NetsParker: 

You Might Also Read:

Cyber Security in 2020 Will Be Defined By Connectivity:

Mitigating IoT Cyber Risks: Training Is The First Step:

 

 

« The Scope Of A Cyber Security Audit
AI Satellite Image Analysis Will Be Regulated »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BakerHostetler

BakerHostetler

BakerHostetler is one of the largest law firms in the USA We have five core practice groups including a specialty practice team in Privacy and Data Protection.

Kualitatem

Kualitatem

Kualitatem Inc. is an independent software testing and information systems auditing company

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

Kenexis

Kenexis

Kenexis is a consulting engineering firm providing services for process hazards analysis, fire and gas mapping, and industrial cybersecurity.

Paygilant

Paygilant

Paygilant’s disruptive technology is designed to protect mobile payment  financial transactions against fraudulent attacks, whether executed by NFC, QR code, P2P or in-app.

Clearswift

Clearswift

Clearswift is trusted by businesses, governments and defense organizations globally for its Adaptive Cyber Security and Data Loss Prevention solutions.

TCDI

TCDI

TCDI specializes in computer forensics, eDiscovery and cybersecurity services.

Egnyte

Egnyte

Egnyte delivers secure content collaboration, compliant data protection and simple infrastructure modernization; all through a single SaaS solution.

th4ts3cur1ty.company

th4ts3cur1ty.company

th4ts3cur1ty.company specialize in delivering intelligence lead adversary emulation purple teaming & the bespoke building of Security Operation Centers.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija (Slovenia Accreditation) is the national standards accreditation body for Slovenia.

DisruptOps

DisruptOps

Built for today’s cloud-scale enterprises, DisruptOps’ Cloud Detection and Response platform automates assessment and remediation procedures of critical cloud security issues.

GuardDog.ai

GuardDog.ai

guardDog.ai has developed a cloud-based software service with a companion device that work together to simplify network security.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

NetGain Technologies

NetGain Technologies

NetGain Technologies helps small to medium-sized businesses gain access to expert IT talent. We provide strategies that use technology as a driving force behind business growth.

DynTek

DynTek

DynTek delivers exceptional, cost-effective professional IT consulting services, end-to-end IT solutions and managed IT services.

Everfox

Everfox

Everfox (formerly Forcepoint Federal) has been defending the world's most critical data and networks against the most complex cyber threats imaginable for more than 25 years.