{"id":850,"date":"2019-12-21T11:22:35","date_gmt":"2019-12-21T05:52:35","guid":{"rendered":"https:\/\/www.hostnamaste.com\/blog\/?post_type=news&#038;p=850"},"modified":"2020-08-04T12:10:02","modified_gmt":"2020-08-04T06:40:02","slug":"cyber-security-predictions-for-2020","status":"publish","type":"news","link":"https:\/\/www.hostnamaste.com\/blog\/news\/cyber-security-predictions-for-2020\/","title":{"rendered":"Cyber Security Predictions for 2020"},"content":{"rendered":"<figure id=\"attachment_851\" aria-describedby=\"caption-attachment-851\" style=\"width: 758px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-851\" src=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/12\/Cyber-security-predictions-for-2020-HostNamaste-1024x512.png\" alt=\"Cyber security predictions for 2020 - HostNamaste\" width=\"758\" height=\"379\" srcset=\"https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/12\/Cyber-security-predictions-for-2020-HostNamaste-1024x512.png 1024w, https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/12\/Cyber-security-predictions-for-2020-HostNamaste-300x150.png 300w, https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/12\/Cyber-security-predictions-for-2020-HostNamaste-768x384.png 768w, https:\/\/www.hostnamaste.com\/blog\/wp-content\/uploads\/2019\/12\/Cyber-security-predictions-for-2020-HostNamaste.png 1280w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><figcaption id=\"caption-attachment-851\" class=\"wp-caption-text\"><\/span> <span style=\"font-family: Verdana, Geneva;\"><strong><span style=\"color: #333333;\"><a style=\"color: #333333;\" href=\"https:\/\/www.hostnamaste.com\/blog\/news\/cyber-security-predictions-for-2020\/\"><span style=\"font-size: 12pt;\">Cyber security predictions for 2020 &#8211; HostNamaste<\/span><\/a><\/span><\/strong><\/span><\/figcaption><\/figure>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\">Email and internet-facing applications will continue to be the top threat vectors as we head into 2020. Unfortunately, many organizations still have inadequate protections in place. Email threats evolve quickly as attackers find new ways to evade traditional email security solutions, so organizations will need to turn to more advanced protection that can keep up with changing tactics. Web application security is often overlooked because most organizations don\u2019t have the resources or skills needed to manage the solutions properly. In addition many customers presume their hosting service supplies this protection when they may cover some but not all their requirements.<\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\">A continuing trend toward cloud-based and as-a-service application security solutions will help make this more accessible for a broader number of organizations, which will help address this problem in the coming year. Finally, as more and more customers leverage <strong><a href=\"https:\/\/www.hostnamaste.com\/blog\/private-cloud-hosting-vs-public-cloud-hosting\/\">public cloud<\/a><\/strong> infrastructure and solutions, human error will continue to be the primary source of breaches, leading to misconfigurations and overlooked vulnerabilities.<\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\">Going into 2020, <strong><a href=\"https:\/\/www.hostnamaste.com\/blog\/news\/demonetization-is-the-key-factor-in-indias-increased-investments-in-it-security-gartner\/\">CISOs<\/a><\/strong> will need to understand the proliferation of privacy and compliance laws that are being proposed and implemented globally. GDPR was just the beginning, and executives need to be prepared to adapt as similar regulations are introduced. The implications of these types of rules can be far-reaching, and they\u2019re bound to get more complex, particularly as organizations try to navigate potential overlap.<\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\">CISOs also need to continue to make sure they are effective at driving support for key security initiatives with the CEO and board members, capitalizing on the attention raised by increasing security concerns to get the resources they need to address new challenges. It will be increasingly important for security executives to focus on how to integrate security into company culture so everyone in the organization understands the roles they play in keeping the company secure.<\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\">Highly targeted attacks, conversation high jacking and deep fakes of peoples voices will proliferate as mechanisms for business email compromise attacks, making these highly targeted threats even more convincing, and ultimately more costly. Recent Barracuda research showed that BEC makes up only seven percent of spear-phishing attacks, but the price for successful attacks can be steep.<\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\">According to the FBI, businesses have lost $26 billion in the past four years due to BEC attacks, and with new tactics like this, I expect to see that number grow even faster. It\u2019s also a major election year so we should expect to see nation states using the Russian playbook to influence elections at both a local and national level, and government organizations need to be prepared to defend against these attacks. IoT-based security attacks will gain more prominence as cybercriminals find new ways to exploit IoT security vulnerabilities.\u201d<\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\">The public sector and education will continue to be key targets of hackers and attackers. Organizations in both of these industries are operating under tight budgets, often with minimal security and IT staff and outdated technology, which leaves them vulnerable to a wide ranges of attacks, such as ransomware.<\/span><\/p>\n<p><span style=\"font-family: Verdana, Geneva; font-size: 14pt;\">I expect to see more consolidation amongst vendors in 2020 as customers look for platforms instead of standalone solutions. Customers will be looking for streamlined experiences that are simple to manage and make their lives easier, and vendors will need to adapt accordingly. <span style=\"font-size: 10pt;\"><a href=\"https:\/\/www.crn.in\/thought-leader\/cyber-security-predictions-for-2020\/\" target=\"_blank\" rel=\"noopener\">Read More Here<\/a><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Email and internet-facing applications will continue to be the top threat vectors as we head into 2020. Unfortunately, many organizations still have inadequate protections in&hellip;<\/p>\n","protected":false},"author":2,"featured_media":851,"comment_status":"open","ping_status":"closed","template":"","tags":[1096,1097,1098,1102,1086,1095,1085,1100,1101,301,1099],"news-category":[1088,1089,1090,1094,1087,1084,1065,1092,1093,1091],"class_list":["post-850","news","type-news","status-publish","has-post-thumbnail","hentry","tag-1096","tag-barracuda-networks","tag-ciso","tag-cloud-based","tag-cyber-security","tag-cyber-security-predictions","tag-cyber-security-predictions-for-2020","tag-fbi","tag-gdpr","tag-public-cloud","tag-tech-trends","news-category-1088","news-category-barracuda-networks","news-category-ciso","news-category-cloud-based","news-category-cyber-security-predictions","news-category-cyber-security-predictions-for-2020","news-category-cybersecurity","news-category-fbi","news-category-gdpr","news-category-tech-trends"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news\/850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/comments?post=850"}],"version-history":[{"count":0,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news\/850\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/media\/851"}],"wp:attachment":[{"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/media?parent=850"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/tags?post=850"},{"taxonomy":"news-category","embeddable":true,"href":"https:\/\/www.hostnamaste.com\/blog\/wp-json\/wp\/v2\/news-category?post=850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}