Cybersecurity forecast: What’s the outlook for 2019?
DIGITAL transformation is expected to continue to be a hot topic in 2019. The debut of 5G mobile technology will even push DX to a higher gear.
With data and apps moving to endpoints, cloud and mobile platforms, enterprises will be open to a wider cyberattack surface and businesses must invest in a security infrastructure that minimizes exposure to cyber risks as it responds to unwanted intrusions with full force and on time.
the triggers and sources of cybersecurity threats?
Palo Alto Networks, a global cybersecurity leader, recently provided an overview of the coming threat landscape in a In his introductory note, Kevin forecasts aren’t coming from crystal balls while past trends are likely to continue. They may not impact the Philippines or the Asean but intelligent predictions will be useful in calling people’s attention to think about approaches in dealing with real problems.
Prediction one: Business emails with nasty surprises, attached. Over $12 billion has been stolen worldwide over the email compromise. As the theft of passwords and login details becomes a pattern that will continue to plague businesses, it is doubtful businesses will be able to beat cybercriminals at their own game.
Passwords remain amongst the weakest links in computer security — and offering little proof of a user’s identity. 2019 will see measures such as two-factor or multi-factor authentication and biometrics become increasingly commonplace.
Supply chain will be your weakest link. The digital age has helped break down barriers to create an interconnected, global supply chain, making it very easy for businesses to tap suppliers and outsourced services from around the globe. However, this will also prove to be a boon to attackers preying on existing security weaknesses. In the healthcare sector, third-party connected medical devices such as MRI and X-ray machines, can provide multiple new attack surfaces and vulnerabilities. In 2019, an unsecured connected device could even serve as an attack gateway as easily as any computer or smartphone.
Useful tip: Computer secu network to ensure sensitive information is kept separate and secure, away from external devices and systems. If thirdparty systems and devices reside on your network, apply a Zero Trust mode to inspect them in a zone which only allows approved users and apps to communicate with them.
Data protection legislation gains ground in APAC. With 700 million active mobile connections, Asean is the fastest-growing Internet region. It’s a good digital economy and the recent Master Plan on Asean Connectivity 2025 (MPAC 2025) has outlined an initiative to establish an Asean Digital Data Governance Framework in a