Overcoming the 2019 cyberthreat

1 April 2019 Infrastructure, Information Security

Over the last couple of years, the dramatic development of digital technologies has fuelled the growth and needs of the mobile workforce. Recent research by Microsoft found that only 11.4% of European employees feel highly productive at work, and, amidst the arrival of innovative technologies like 5G, mobile working is not only becoming increasingly prevalent, but also more popular with offices no longer confined to four walls.

Ronald Ravel
Ronald Ravel

However, while it is important organisations give employees the flexibility of remote working, they must also be mindful that – in an age of mass data proliferation – the wider a network perimeter has to stretch, the more scope exists for security breaches.

The 2019 cyber-threat landscape

As organisations adapt to this rapidly changing environment, they must be cautious of technology’s role as both enabler and inhibitor. With so much data now available and increasingly central to an organisation’s day-to-day operations, the cost of any security breach is quickly increasing. An IBM and Ponemon Institute study, for example, showed the global average cost of a data breach rose by 6.4% year-on-year in 2018 to $3.86 million.

Coupled with this is the growing intelligence of the cyber-criminals attacking this data, who are constantly evolving their methods to stay ahead of the game – as demonstrated by the 2018 SonicWall Cyber Threat Report, which reported a 101.2% increase in never-before-seen cyberattacks and malware variants. Cybercriminals are turning to highly effective weapons like ransomware, IoT malware and TLS/SSL-encrypted malware to target organisations around the world.

The first line of defence

Devices are often the first line of defence for organisations – instances of laptops being left on the train, stolen on a busy commute or connecting to a coffee shop’s unsecure network, can leave sensitive data exposed. IBM and the Ponemon Institute found that almost half of security breaches involved a malicious or criminal attack, while a further 27% were due to the carelessness of negligent employees – and combining the two creates a potent concoction which IT managers need to successfully manage.

It is therefore important to ensure the security solutions are in place to protect business-sensitive information at both a hardware and network level. Organisations should look to devices such as Toshiba’s X-Series, which boast biometric features alongside in-built smart data encryption tools. Alongside these initial barriers, remote access and wiping tools are important in enabling IT teams to remove files and data from devices should they land in the wrong hands. Even within an organisation, it is important for individual departments to ensure security and confidentiality for sensitive documents. Central administration tools can grant access rights based on job type and job seniority – for example, restricting sensitive financial information from those sitting outside of that department.

Beyond digital technological solutions, organisations must also invest in training and education to ensure employees are taking the right methods to identify and mitigate potential security attacks, and prevent them from happening. According to Toshiba research, two thirds of organisations want to invest in engaging their staff in IT training, in turn ensuring correct and secure usage and ultimately reducing the chances of employee negligence.

The rise of IoT and the mobile edge

The rise and adoption of IoT is creating a growing need for even more stringent data protection policies. Security specialists such as Avast are specifically calling out IoT as a key battleground in 2019 as sophistication in this area increases, and as a result businesses will need to consider new and innovative security methods. One such approach is to turn to mobile edge computing solutions, which not only pave the way for IoT to be used in the enterprise operationally, but ensure that it’s also achieved in a secure manner.

Such solutions enable data communication to be locally encrypted and translated to a communication protocol before being sent to the company’s network core via the cloud. As we see new IoT-driven solutions such as wearables enter the enterprise, the need to protect the ever-growing swathes of data created by this trend will result in organisations placing even more value on mobile edge computing.

Security remains the most important element of an organisation’s IT strategy, with the current threat landscape more diverse and challenging than ever before. Solutions may only remain secure for a matter of months before cyber-criminals decipher ways to breach them, and so it is essential IT leaders constantly monitor and evolve to stay ahead of the game. In the age of IoT, this means going beyond protecting the network at its core, but also using robust hardware and edge solutions to nullify the threat across the ever-expanding network perimeter.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Fastest PCIe Gen 5.0 NVMe SSD
Products & Solutions Infrastructure
Sandisk has unveiled the WD_BLACK SN8100 NVMe SSD with PCIe Gen 5.0 technology, an internal SSD delivering speeds up to 14 900 MB/s and capacities up to 4 TB, with 8 TB solutions available soon.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Unified storage solution
Products & Solutions Infrastructure
CASA Software has announced the local availability of Nexsan’s upgraded unified storage solution, Unity NV4000, which is ideal for mixed workloads, from virtualisation and video surveillance to secure backup and recovery.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Advanced surveillance storage from ASBIS
Infrastructure Surveillance Products & Solutions
From a video storage solutions perspective, SkyHawk drives, designed for DVRs and NVRs, offer high capacity, optimised firmware, and a reliability workload rating of hundreds of terabytes per year.

Read more...
Power surges are killing our networks
Duxbury Networking Infrastructure
With power surges and lightning strikes becoming an all-too-familiar threat to South African infrastructure, Duxbury Networking is calling on local installers and network integrators to follow proper grounding protocols.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...