Cy­ber­se­cu­rity fore­cast: What’s the out­look for 2019?

Manila Times - - Sunday Business & I.t. - TECH SPACE

DIG­I­TAL trans­for­ma­tion is ex­pected to con­tinue to be a hot topic in 2019. The debut of 5G mo­bile tech­nol­ogy will even push DX to a higher gear.

With data and apps mov­ing to end­points, cloud and mo­bile plat­forms, en­ter­prises will be open to a wider cy­ber­at­tack sur­face and busi­nesses must in­vest in a se­cu­rity in­fra­struc­ture that min­i­mizes ex­po­sure to cy­ber risks as it re­sponds to un­wanted in­tru­sions with full force and on time.

the trig­gers and sources of cy­ber­se­cu­rity threats?

Palo Alto Net­works, a global cy­ber­se­cu­rity leader, re­cently pro­vided an over­view of the com­ing threat land­scape in a In his in­tro­duc­tory note, Kevin fore­casts aren’t com­ing from crys­tal balls while past trends are likely to con­tinue. They may not im­pact the Philip­pines or the Asean but in­tel­li­gent pre­dic­tions will be use­ful in call­ing peo­ple’s at­ten­tion to think about ap­proaches in deal­ing with real prob­lems.

Pre­dic­tion one: Busi­ness emails with nasty sur­prises, at­tached. Over $12 bil­lion has been stolen world­wide over the email com­pro­mise. As the theft of pass­words and lo­gin de­tails be­comes a pat­tern that will con­tinue to plague busi­nesses, it is doubt­ful busi­nesses will be able to beat cy­ber­crim­i­nals at their own game.

Pass­words re­main amongst the weak­est links in com­puter se­cu­rity — and of­fer­ing lit­tle proof of a user’s iden­tity. 2019 will see mea­sures such as two-fac­tor or multi-fac­tor au­then­ti­ca­tion and bio­met­rics be­come in­creas­ingly com­mon­place.

Sup­ply chain will be your weak­est link. The dig­i­tal age has helped break down bar­ri­ers to cre­ate an in­ter­con­nected, global sup­ply chain, mak­ing it very easy for busi­nesses to tap sup­pli­ers and out­sourced ser­vices from around the globe. How­ever, this will also prove to be a boon to at­tack­ers prey­ing on ex­ist­ing se­cu­rity weak­nesses. In the health­care sec­tor, third-party con­nected med­i­cal de­vices such as MRI and X-ray ma­chines, can pro­vide mul­ti­ple new at­tack sur­faces and vul­ner­a­bil­i­ties. In 2019, an un­se­cured con­nected de­vice could even serve as an at­tack gate­way as eas­ily as any com­puter or smart­phone.

Use­ful tip: Com­puter secu net­work to ensure sen­si­tive in­for­ma­tion is kept sep­a­rate and secure, away from ex­ter­nal de­vices and sys­tems. If third­party sys­tems and de­vices re­side on your net­work, ap­ply a Zero Trust mode to in­spect them in a zone which only al­lows ap­proved users and apps to com­mu­ni­cate with them.

Data pro­tec­tion leg­is­la­tion gains ground in APAC. With 700 mil­lion ac­tive mo­bile con­nec­tions, Asean is the fastest-grow­ing In­ter­net re­gion. It’s a good dig­i­tal econ­omy and the re­cent Master Plan on Asean Con­nec­tiv­ity 2025 (MPAC 2025) has out­lined an ini­tia­tive to es­tab­lish an Asean Dig­i­tal Data Gov­er­nance Frame­work in a

Newspapers in English

Newspapers from Philippines

© PressReader. All rights reserved.