2020’s Top Cybersecurity Challenges


2020 has started. This is a time when pundits and writers assess what happened in the past year and look ahead. This blog will provide commentary and context on the big trends picked by top minds in cybersecurity threat intelligence.

Inevitably, threats like phishing and ransomware will continue to keep CIOs up at night. What new events, tactics and concepts will shape cybersecurity in 2020?
More importantly, how can companies safeguard their company against threats both old and new? Relying on trusted partners and solid tools can be the antidote.

1.   Cloud Vulnerabilities


There is a misconception that storing data and handling processes in the Cloud guarantees security. In reality, misconfigured cloud instances resulted in more than half of data breaches in 2019. This trend will inevitably continue well into 2020. Amazon’s configuration guide for businesses to establish their own cloud environment is well over 100 pages, allowing for human error when implementing. The increasing move from local databases to a cloud-hosted model allows for more opportunities for hackers to take advantage of misconfigurations as well as supply their own ingenuity that could result in data breaches.

2.   Mobile as a Cyber Crime Vector


Believe it or not, your smartphone is the next frontier in cybercrime. Techniques to infect mobile devices through apps are becoming more common. These fake and malicious apps are designed to steal data on your smartphone and even swipe any stored passwords on these devices. Additionally, social engineering through SMS text messages (known as Smishing) will continue to increase next year. If you are a business that issues company smartphones to employees, or you allow employees to bring their own device (BYOD) to work, then you will need to address this risk.

3.   Supply Chain Cyber Attacks


The supply chain of a hardware and software consists of the various components that make-up the solution. If malicious code infects a component within a larger trusted application, then the overall application is at risk. Compromising one part of the supply chain can infect multiple vendors. Supply chain attacks are up 78% in 2019, according to Symantec. One example of this is with Asus, a computer and phone vendor. Asus was a victim of supply chain attacks in 2018 that resulted in them providing infected computer systems to upwards of 500,00 customers.

4.   More Data Privacy Regulations

The protection of privacy rights for individuals and their data is a growing trend. The California Consumer Privacy Act (CCPA) goes into effect January 1, 2020. Other states are considering similar privacy bills in 2020, including Massachusetts, Minnesota, Pennsylvania, New Jersey and New York. Many countries outside of the United States are following suit. These acts combined with the Global Data Protection Regulation (GDPR) provide a strong impetus for data and privacy standards. Companies are becoming overwhelmed with the various components and requirements of rules. As a result, IT departments. General Counsel and C-Level Executives are often stretched thin with spare time and each new requirement only adds to the complexity of running a business.


Comments

Popular posts from this blog

The Biggest Threats in Cyber Security

Spam vs. Phishing: What Is the Difference?

Threat Hunting Steps