Top five security trends to look out for in 2019

March 2019 Surveillance, Information Security

2018 was a year in which many countries focused on implementing and embracing new technologies. In tandem, many nations also witnessed cyber and physical security challenges such as back to back cyberattacks.

According to Emirates News Agency (WAM), 274 cyberattacks targeted the UAE alone for the first seven months of 2018, out of which 39 were extremely detrimental. That said, as we move forward to 2019, we clearly notice the continuation of several important trends and the development of some new ones. These trends will have an important role to play in the security sector.

From the continued focus on cybersecurity to the acquisition of global players, we have highlighted the top five security related trends to look forward to in 2019.

Continued focus on cybersecurity

The first trend we see is a continued focus on cybersecurity. There continues to be a growing number of high-profile breaches in our industry. Along with governmental regulations designed to strengthen security, privacy, and mitigate the damage caused by these increasing cyberattacks, we have to be more vigilant than ever. Cybercrime and criminal cyber activity are not only costly, but they can cause tremendous damage to an organisation’s reputation.

Recently, Facebook lost another 50 million users when its data was breached. While the financial cost may not represent a lot in terms of Facebook’s bottom line, the loss of trust and damage to their brand is significant.

Another important part of concerns around cybersecurity is the increasing awareness of untrustworthy devices. It has become clear that this lack of trust is not a function of engineering, but more often malicious intent that can come from any number of sources. For our part, we have developed countermeasures that can help isolate untrustworthy devices on the network. Our systems are customised to keep these untrustworthy devices from sending sensitive or private information to unauthorised recipients. It also protects other systems, including command and control systems, from being accessed.

All of us have a responsibility to protect our security platforms and networks, and all the systems they connect to through vigilance and transparency. As technology providers, we must ensure that we are not only good data stewards, but also upstanding global citizens.

Greater attention to risk assessment

Despite the fact that some businesses believe that their networks are secure, in many cases it takes mere seconds to guess device passwords and gain access to sensitive systems. When governments have concerns about potential risks to their systems, this naturally becomes an indication to other organisations that they too should take a closer look at their vulnerabilities. As a result, we are now seeing large organisations balancing out their risk assessment by leveraging cyber-litigation insurance. And this is surely to increase throughout 2019.

Increased unification that leads to better understanding

In terms of the technology, we are sure to see even more unification of systems in 2019. Organisations are already experiencing the benefits of unifying access control systems with video surveillance, and this will only grow. What will also increase is the ability to employ analytics tools to leverage the vast amounts of data that physical security systems and other devices are already collecting. When organisations are able to understand and leverage their data, they can use it to improve any number of business functions, including efficiency, operations, customer service and revenue generation.

The challenges here will arise around sharing information between stakeholders, particularly in terms of maintaining individual privacy and control over sensitive data. But we will see solutions that will allow for disparate organisations to collaborate effectively to achieve even greater understanding.

More organisations adopting hybrid cloud storage

We are seeing an increasing number of organisations moving their storage to hybrid-cloud solutions. This allows them to divide their data between cloud and on-premises options. There are tremendous benefits here as people can take advantage of the greater flexibility and cost-savings associated with cloud solutions — often for long term archival — while maintaining the all-important feeling of control of their data. This also includes having the business data secured and protected from Denial of Service (DDoS) attacks while protecting sensitive information and transaction.

Continued acquisition of global players

In recent years, we have seen several companies consolidate as major players acquire other organisations. While the bringing together of technology has the potential to yield compelling advancements, it can also slow test cycles for these businesses. 2019 will bring many opportunities for companies such as Genetec to help its end users and partners put an enterprise-grade security platform in place, with an open-architecture, scalable, and extensible solution.

For more information contact Genetec, Brent Cary, [email protected], www.genetec.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Data security and privacy in global mobility
Security Services & Risk Management Information Security
Data security and privacy in today’s interconnected world is of paramount importance. In the realm of global mobility, where individuals and organisations traverse borders for various reasons, safeguarding sensitive information becomes an even more critical imperative.

Read more...
Sophos celebrates partners and cybersecurity innovation at annual conference
News & Events Information Security
[Sponsored] Sun City hosted Sophos' annual partner event this year, which took place from 12 to 14 March. Sophos’ South African cybersecurity distributors and resellers gathered for an engaging two-day conference.

Read more...
Empowering cities with intelligent security solutions
Secutel Technologies Surveillance IoT & Automation
By leveraging advanced AI analytics, real-time data collection, and seamless integration capabilities, cities can address pressing security challenges and create a safer environment for residents.

Read more...
Re-imagining business operations with the power of AI
AI & Data Analytics Surveillance
inq., a Convergence Partners company, has introduced a range of artificial intelligence (AI) solutions to assist organisations across industry verticals in optimising business operations and improving internal efficiencies.

Read more...
Eight MP dome for harsh environments
Axis Communications SA Surveillance Products & Solutions
Axis Communications announced a marine-grade stainless steel camera that offers performance in harsh environments. Enclosed in an electropolished stainless steel casing, it can withstand the corrosive effects of seawater and cleaning chemicals.

Read more...
Enhance control rooms with surveillance and intelligence
Leaderware Editor's Choice Surveillance Mining (Industry)
Dr Craig Donald advocates the use of intelligence and smart surveillance to assist control rooms in dealing with the challenges of the size and dispersed nature common in all mining environments.

Read more...
The CIPC hack has potentially serious consequences
Editor's Choice Information Security
A cyber breach at the South African Companies and Intellectual Property Commission (CIPC) has put millions of companies at risk. The organisation holds a vast database of registration details, including sensitive data like ID numbers, addresses, and contact information.

Read more...
AI augmentation in security software and the resistance to IT
Security Services & Risk Management Information Security
The integration of AI technology into security software has been met with resistance. In this, the first in a series of two articles, Paul Meyer explores the challenges and obstacles that must be overcome to empower AI-enabled, human-centric decision-making.

Read more...
Milestone Systems joins CVE programme
Milestone Systems News & Events Information Security
Milestone Systems has partnered with the Common Vulnerability and Exposures (CVE) Programme as a CVE Numbering Authority (CNA), to assist the programme to find, describe, and catalogue known cybersecurity issues.

Read more...