{"id":770,"date":"2020-07-28T07:11:52","date_gmt":"2020-07-28T12:11:52","guid":{"rendered":"https:\/\/cmitsolutions.com\/boston-ma-1089\/?p=770"},"modified":"2023-03-23T23:14:48","modified_gmt":"2023-03-24T04:14:48","slug":"2020-cybersecurity-trends-on-the-rise","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/boston-ma-1089\/blog\/2020-cybersecurity-trends-on-the-rise\/","title":{"rendered":"2020 Cybersecurity Trends On The Rise"},"content":{"rendered":"<h1><strong>Cybersecurity Trends to Watch in 2020<\/strong><\/h1>\n<p>As COVID-19 drastically shuffled priorities across organizations, the need for improved cybersecurity has skyrocketed. Reports of malicious attacks and scams rose quickly during the lock down period while hordes of remote workers logged in from their virtual offices. Months later and the US continues to struggle containing the virus. One takeaway businesses should regard from this disaster is that being prepared is highly underrated.<\/p>\n<p>Not only did we not see the COVID-19 pandemic coming, but as a country we also were not adequately prepared to fight it on multiple levels. That same insufficient response is exactly how a business feels when blindsided and debilitated by a cyber-attack. The following cybersecurity processes, technologies and trends are most likely to gain attention and investment given the current environment.<\/p>\n<h3><strong>Fear Drives Cybersecurity Spending<\/strong><\/h3>\n<p>With privacy regulations and costly repercussions already in place (see: <strong><span style=\"color: #000080;\"><a style=\"color: #000080;\" title=\"Everyone Thinks The GDPR Does Not Apply To Them \u2013 Here\u2019s What You Need To Know\" href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/everyone-thinks-the-gdpr-does-not-apply-to-them-heres-what-you-need-to-know\/\">GDPR<\/a><\/span><\/strong> and <a title=\"Does CCPA Apply To My Business?\" href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/does-ccpa-apply-to-my-business\/\"><strong><span style=\"color: #000080;\">CCPA<\/span><\/strong><\/a>), the focus on digital infrastructure is more critical than ever. Scammers and hackers know you are more likely to fall prey to scams in times of crisis. Now add in the lock down measures, increasingly sophisticated malware attacks, hordes of e-commerce traffic, and the massive shift in people working remotely. All of this has forced executives and security leaders to look at how they are safeguarding their organizations.<\/p>\n<p><a href=\"https:\/\/www.zdnet.com\/article\/garmins-outage-ransomware-attack-response-lacking-as-earnings-loom\/\"><strong><span style=\"color: #000080;\">The latest high-impact ransomware attack on Garmin<\/span><\/strong><\/a> is prime example of how not to handle a ransomware attack. As they scramble to restore a multi-system outage with little to no communication of the problem, it\u2019s clear they need to step up their security game\u2014and fast.<\/p>\n<p><a href=\"https:\/\/www.securitymagazine.com\/articles\/92437-of-organizations-to-increase-cybersecurity-spending-following-covid-19-pandemic\"><strong><span style=\"color: #000080;\">70 percent of organizations anticipate increasing their investments in cybersecurity solutions<\/span><\/strong><\/a>, due to the coronavirus crisis creating new opportunities for cybercriminals according to Security Magazine. Besides having enough operating capital to weather the economic effects, companies would also be foolish to cut cybersecurity spending and stop mitigating risks in the near term.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-772\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Cybersecurity-coronavirus-statistic-image-1024x341-1-300x100.png\" alt=\"\" width=\"1008\" height=\"336\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Cybersecurity-coronavirus-statistic-image-1024x341-1-300x100.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Cybersecurity-coronavirus-statistic-image-1024x341-1-768x256.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Cybersecurity-coronavirus-statistic-image-1024x341-1.png 1024w\" sizes=\"(max-width: 1008px) 100vw, 1008px\" \/><\/p>\n<h3><strong>Coronavirus \/ Covid-19<\/strong><\/h3>\n<p>The global pandemic\u2019s impact has rippled through all of our lives. It also has major cybersecurity implications as well. With millions of workers working from home (see: <a title=\"Working At Home Impacts During COVID-19\" href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/working-at-home-impacts-during-covid-19\/\"><strong><span style=\"color: #000080;\">CMIT\u2019s working safely from home tips<\/span><\/strong><\/a>) to recent cyber-attacks and espionage being performed on hospitals and companies developing <strong><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/www.nytimes.com\/2020\/07\/16\/us\/politics\/vaccine-hacking-russia.html\">vaccines<\/a><\/span><\/strong> and therapies the stakes couldn\u2019t be higher. All cybersecurity professionals are on high alert during these times and will remain vigilant for the foreseeable future.<\/p>\n<h3><strong>High Demand for Cybersecurity Professionals<\/strong><\/h3>\n<p>Now that executives are paying attention to security and the rising importance of chief information security officers (CISO), finding experienced candidates to fill those cybersecurity vacancies will continue to be a problem. By 2021, it is predicted there will be 3.5 million cybersecurity job openings in high demand. 100 percent of Fortune 500 and Global 2000 companies will have a CISO position by 2021, up from 70 percent in 2018 reports <strong><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/cybersecurityventures.com\/jobs\/\">Cybersecurity Ventures<\/a><\/span><\/strong>.<\/p>\n<p>Despite the crisis, a recent <a href=\"https:\/\/cmo.adobe.com\/articles\/2020\/4\/survey--how-a-remote-workforce-is-shifting-cio-priorities.html\"><strong><span style=\"color: #000080;\">Adobe survey<\/span><\/strong><\/a> found half of the CIOs surveyed reported their organizations are still actively hiring\u2014though 47% anticipated the current situation will slow their hiring cycle. As more companies implement artificial intelligence\/machine learning (AI\/ML) to automate their IT and customer support, the bigger issue becomes the shortage of talent with a deep understanding of those processes. That talent gap continues to widen and while demand remains high, <a href=\"https:\/\/www.monster.com\/career-advice\/article\/tech-cybersecurity-zero-percent-unemployment-1016\"><strong><span style=\"color: #000080;\">companies will need to heavily invest in training young cybersecurity professionals<\/span><\/strong><\/a> who have a combination of technical, business, and soft skills.<\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-773\" src=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Cybersecurity-election-statistic-image-1024x342-1-300x100.png\" alt=\"\" width=\"1068\" height=\"356\" srcset=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Cybersecurity-election-statistic-image-1024x342-1-300x100.png 300w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Cybersecurity-election-statistic-image-1024x342-1-768x257.png 768w, https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-content\/uploads\/sites\/100\/2023\/03\/Cybersecurity-election-statistic-image-1024x342-1.png 1024w\" sizes=\"(max-width: 1068px) 100vw, 1068px\" \/><\/p>\n<h3><strong>Major Spotlight on Election Security <\/strong><\/h3>\n<p>As witnessed from the <strong><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=&amp;ved=2ahUKEwihyYLh9OTqAhUxWN8KHawPC20QFjAAegQIEBAB&amp;url=https%3A%2F%2Fwww.justice.gov%2Fstorage%2Freport.pdf&amp;usg=AOvVaw2pSPCyy08fA4LBEaHIrsqc\">2016 election interference<\/a><\/span><\/strong>, there\u2019s a heightened awareness on identifying and removing disinformation campaigns before they go viral on social media. Just last week, hackers successfully accessed Twitter\u2019s internal systems to hijack and the top accounts of prominent political and influential figures in a bitcoin scam. <a href=\"https:\/\/www.nytimes.com\/2020\/07\/15\/technology\/twitter-hack-bill-gates-elon-musk.html\"><strong><span style=\"color: #000080;\">This recent Twitter attack<\/span><\/strong><\/a> is a prime example of how easily corruption can unknowingly come from inside an organization.<\/p>\n<p>In an early <a href=\"https:\/\/www.pbs.org\/newshour\/politics\/social-media-disinformation-leads-election-security-concerns-poll-finds\"><strong><span style=\"color: #000080;\">2020 poll<\/span><\/strong><\/a>, 59 percent of Americans believe false election information is becoming more difficult to spot, while 37 percent believe it is the opposite. Expect the spotlight on election security coverage to heat up considerably the closer we get to the election this fall. Be wary of intentionally misleading and inaccurate stories being portrayed as truth on social media. Fact check the sources for credibility before sharing any political content.<\/p>\n<h3><strong>Emerging Cybersecurity Technologies <\/strong><\/h3>\n<p>Many organizations made the leap to support large numbers of remote employees or upgraded their e-commerce platforms seemingly overnight since the crisis started. The emergence of the Zero Trust security strategy has drawn increasing attention from cybersecurity leaders who are frustrated by their vulnerabilities. A Zero Trust strategy or Zero Trust architecture essentially trusts no one by assuming all data access points are potential breaches. This security model securely connects the right users to the right data at the right time under the right conditions.<\/p>\n<p><a href=\"https:\/\/securityintelligence.com\/articles\/these-cybersecurity-trends-could-get-a-boost-in-2020\/\"><strong><span style=\"color: #000080;\">Zero Trust strategies are likely to drive investment in several technologies<\/span><\/strong><\/a>, such as cloud access controls, unified endpoint management (UEM), and security information and event management (SIEM) as organizations look towards applying artificial intelligence (AI) techniques to identify and isolate intruders. Moving forward, expect to see more Zero Trust projects get fast-tracked as businesses invest in <a title=\"4 Key Steps For Securing Your Passwords\" href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/4-key-steps-for-securing-your-passwords\/\"><strong><span style=\"color: #000080;\">multi-factor authentication (MFA)<\/span><\/strong><\/a> and microsegment their networks.<\/p>\n<h3><strong>Opportunity Awaits<\/strong><\/h3>\n<p>The saying that \u201cout of crisis comes great opportunity\u201d paves the way for organizations to reassess their cybersecurity priorities and take the necessary steps toward greater process efficiency and technology innovation. If 2020 has any silver linings, one could be that the cybersecurity trends emerging may ultimately make businesses more resilient in the future.<\/p>\n<p>Written by: <a title=\"About\" href=\"https:\/\/cmitsolutions.com\/boston-ma-1089\/about\/\"><strong><span style=\"color: #000080;\">Chris Zambuto<\/span><\/strong><\/a> | Chief Information Security Officer <strong><span style=\"color: #000080;\"><a style=\"color: #000080;\" href=\"https:\/\/www.facebook.com\/CMITBostonCambridge\/\">@<\/a><\/span><\/strong><a href=\"https:\/\/www.facebook.com\/CMITBostonCambridge\/\"><strong><span style=\"color: #000080;\">CMITBostonCambridge<\/span><\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Trends to Watch in 2020 As COVID-19 drastically shuffled priorities across&#8230;<\/p>\n","protected":false},"author":259,"featured_media":771,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[28],"tags":[],"class_list":["post-770","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts\/770","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/comments?post=770"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/posts\/770\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/media\/771"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/media?parent=770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/categories?post=770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/boston-ma-1089\/wp-json\/wp\/v2\/tags?post=770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}