0
Cybersecurity trends in 2019: from mobile devices and IoT to cloud
2018-12-17T13:59:13.525Z17 December 2018

Cybersecurity trends in 2019: from mobile devices and IoT to cloud

In 2019, advances in artificial intelligence and machine learning, driven by an ever-increasing amount of data, will have a tremendous impact on technology and security. Migration of enterprises to the cloud, distribution of connected devices / IoT / IIoT, full-scale implementation of 5G networks will create more opportunities for effective hacker attacks.

Phishing

E-mail phishing attacks will become the most common threat among consumers and businesses. On the rise are all types of e-mail attacks: be it the use of a malicious link, attachments, or targeted BEC attacks (compromised business correspondence) that contain certain text messages-traps. Since 2015, the number of phishing URLs blocked by Trend Micro has increased by almost 3,800%.

Users

Attacks with social engineering will replace the spread of exploits; chat bots will be compromised; celebrity accounts will be exposed to attacks like Watering Hole; will continue the massive use of stolen personal data.

Business

Providing employees with the opportunity to work from home can be a threat to the security of enterprises, companies will have to rethink the value of the operations of collecting and analyzing user data inherent in current advertising models, since such a violation would be costly. By 2020, up to 75% of new business applications will have to choose between convenience and security.

Government

The fight against fake news will unfold under the pressure of various pre-election races. Countries will increase their own cyber presence; strengthening regulatory oversight; The focus will be on privacy and IoT.

Cloud infrastructure

Incorrect setting of security parameters during migration to the cloud will lead to more data leaks; the cloud will be used for mining cryptocurrency; additional cloud software vulnerabilities will be detected.

Cyber security industry

Cybercriminals will use more covert attack methods; 99.99% of exploit attacks are still not based on zero-day vulnerabilities; targeted attacks will spread, including one that use AI.



Views
7
Shares
0
Comments
0

Comments

Latest news
How to become LIR in 7 days
How to become LIR in 7 days

There is an Internet infrastructure that includes switches, routers, which require a fairly large number of ..

30 August 2018
How to avoid mistakes when choosing a hosting
How to avoid mistakes when choosing a hosting

Everyone says that they learn from mistakes, but sometimes these mistakes can lead to very large losses. The..

17 September 2018
What is the reason for the global increase in the nu..
What is the reason for the global increase in the nu..

In April 2017, there were 320 hyper-scalable data centers in the world, and in December their number was 390..

15 November 2018
Samsung plans to become one of the telecommunication..
Samsung plans to become one of the telecommunication..

Samsung Electronics intends to take advantage of the opportunities that will open after the commercial intro..

27 September 2018

Do you like cookies? 🍪 We use cookies to ensure you get the best experience on our website. By using our website you agree with our policy!

I AGREE