AI Use Will Increase on Both Sides
AI adoption will increase on both sides. Hackers will attempt to corrupt and hijack AI systems with automated and intelligent attacks, and try to alter the logic of these tools to perform malicious tasks. Cybersecurity counter measures will seek to use AI to combat the rise in these intelligence based attacks. AI is already in use by cybersecurity firms and large companies perform real-time threat analysis on their networks to spot potential attacks before they are able to cause any damage.
5G Data Service Will Connect More Target Devices to the Internet
As is the case with most of the new technologies that come to market, the potential for improvement is also shadowed by unintended negative consequences. 5G will enable millions more devices to connect to the internet, all with high bandwidth capabilities. This means we are likely to see new record breaking DDoS attacks utilising an increased number of compromised devices connected at even faster speeds.
Ransomware Instances Will Continue to Decline
IoT continues to enable web based attacks
Due to the insecure nature of most IoT platforms, the ability of attackers to infiltrate and maliciously control IoT devices has been a growing concern. Some inexpensive IoT devices such as IP cameras and Smart Home devices don’t even have default passwords set or are relying on undocumented APIs with no authentication and the ‘walled garden’ approach of being behind your home or office firewall to protect themselves. This means that companies with such devices installed have a huge IT security threat within their organisation without even knowing it, creating a much larger attack surface for cybercriminals to target.
Multifactor Security Methods Become More Common
Unauthorised access to your accounts will become much more difficult for hackers to accomplish, but it won’t be impossible. Already, some two-factor authentication methods such as mobile text messaging, which uses One Time Pins (OTP), have been thwarted by hackers. In some cases, they will illegally clone or swap out cell phone SIM cards to control the target’s mobile number. This allows them to receive the text messages that were intended for the owner of the account, thereby giving them a means to login.
Biometric vulnerabilities such as facial recognition and fingerprint technologies will also have added pressure with criminals creating ‘fingerprint master keys’ which have a high probability of unlocking devices due to the use of partial matching. New methods are constantly being developed to spoof user identities to trick the underlying technologies that make up the biometric systems into granting attackers unauthorised access to devices and information.
Cybersecurity Heads to the Cloud
Companies will increasingly favour cloud-based security products which allow for better scalability and flexibility. Security teams will load the protection that they need, when they need it, to help mitigate threats and attacks. They can then disable it once it is no longer needed. These technologies are easy to implement on cloud and hybrid systems and are sometimes cheaper than an in-house solution that is locally installed and maintained on site within the organisation.
State Sponsored Cyber Attacks Will Grow in Number and Frequency
We have already seen instances of international cyberattacks being carried out at scales only achievable by governmental agencies such as Stuxnet and WannaCry. Such occurrences of malware require research, development and sophistication that is not easily achievable by small groups of cybercriminals, making nation states a more likely culprit. As tensions between competing countries such as China and the USA continue to escalate beyond trade wars and territory disputes, we can expect to hear about subtler attacks between the two nations.
CTA: Protect Yourself
The current state of cybersecurity means that ‘off the shelf’ products are simply no longer enough to protect your business from threats. You simply cannot afford to fall victim to a cybersecurity breach. When did you last perform a security audit on your network? Are you protected against threats such as targeted large scale DDoS attacks and ransomware? Are your staff properly trained on how to avoid common threats such as malware and phishing? If you are not sure, then you need to take the necessary steps to prepare your organisation for all cybersecurity related eventualities.
Author: David Barker, Founder & Technical Director
David founded the company in 1999. Since then he’s masterminded 4D’s development into the fully fledged colocation and connectivity provider that we are today.
As Technical Director, David is responsible for the on-going strategic overview of 4D Data Centres’ IT and physical infrastructure.
Working closely with the Head of IT Server Administration and Head of Network Infrastructure, David also leads any major technical change-management projects that we undertake.