{"id":6546,"date":"2019-07-16T09:45:38","date_gmt":"2019-07-16T14:45:38","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=6546"},"modified":"2019-07-11T13:56:09","modified_gmt":"2019-07-11T18:56:09","slug":"three-cybersecurity-trends-for-2019","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/three-cybersecurity-trends-for-2019\/","title":{"rendered":"Three Cybersecurity Trends for 2019"},"content":{"rendered":"<p style=\"line-height: 150%;\"><strong><span style=\"font-size: 11pt; line-height: 150%; font-family: Arial, sans-serif; color: #000000;\">By Des Nnochiri<\/span><\/strong><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">From online banking, insuring cars, and shopping, we are almost totally reliant upon the internet to complete daily tasks and make our lives easier. <\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">However, as technological advancements give us greater convenience, increase productivity, and provide greater access to whole new swathes of entertainment, consumers and businesses alike leave themselves at risk of cyberattacks against which robust defenses must be in place. <\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">So \u2013 what are the big cybersecurity threats of 2019, and what can you do to protect yourself and your business against them? This article takes a look at three of the biggest cybersecurity trends of 2019.<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-size: 16px; font-family: arial, helvetica, sans-serif;\"><strong><span style=\"line-height: 150%;\">1.<span style=\"font-style: normal; font-variant: normal; font-weight: normal; font-stretch: normal; line-height: normal;\">\u00a0\u00a0\u00a0 <\/span><\/span><\/strong><strong><span style=\"line-height: 150%;\">Targeted Phishing <\/span><\/strong><\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">Phishing can be defined as the fraudulent exercise of sending emails that impersonate reputable companies in order to gain personal information from individuals, including passwords and credit card numbers.<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\"> <a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/07\/targeted-phishing.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-6565\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/07\/targeted-phishing.jpeg\" alt=\"\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/07\/targeted-phishing.jpeg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/07\/targeted-phishing-150x150.jpeg 150w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a><\/span><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">Phishing scams continue to be one of the largest cybersecurity threats. A <\/span><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2019\/02\/07\/five-cybersecurity-trends-to-watch-for-in-2019\/#54e6fbcb4c66\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">study<\/span><\/a><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\"> conducted at the end of 2018 revealed that online phishing attacks were up by 297% throughout the year, and 2019 has seen this trend continue. Many people are still falling victim to well-crafted phishing emails which lure them to harmful URLs or to click on dangerous links. Scammers are becoming increasingly sophisticated. Signs of malicious emails and fake websites are much more difficult to detect, making it harder to protect yourself and your business against the myriad of threats lurking in your inbox.<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">Nonetheless, general awareness of phishing attacks is rising. Consumers and employees are getting better at knowing what to look for when it comes to phishing emails. But \u201cprofessional\u201d scammers are upping their game in kind and are developing and using new software to ensure that the messages they send appear to come from legitimate and trusted sources. <\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">In order for businesses to protect themselves against scams that hackers continue to launch, they need to adopt comprehensive cybersecurity programs. These can take many forms, but good training is often the best defense. Phishing simulators are fantastic tools in this regard, as they walk users through precisely what to be aware of when an email arrives in their inbox. <\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">They guard businesses against social engineering threats by training employees to identify them and the proper protocols for reporting them. They are designed to help users identify and avoid suspicious phishing emails, ensuring they do not give away any important information that can be used against them or the business. This type of training has been shown to <\/span><a href=\"https:\/\/www.skyhighnetworks.com\/cloud-security-blog\/5-it-security-projects-that-will-accelerate-your-career\/\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">double the retention rate<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-size: 11pt; line-height: 150%; font-family: Arial, sans-serif;\"> of security concepts compared with classroom-based security awareness training. <\/span><\/p>\n<h2><span style=\"font-size: 16px;\"><span style=\"font-family: Arial, sans-serif;\">\u00a0<\/span><strong><span style=\"line-height: 150%; font-family: Arial, sans-serif;\">2.<span style=\"font-style: normal; font-variant: normal; font-weight: normal; font-stretch: normal; line-height: normal; font-family: 'Times New Roman';\">\u00a0\u00a0\u00a0 <\/span><\/span><\/strong><strong><span style=\"line-height: 150%; font-family: Arial, sans-serif;\">Cloud Insecurity <\/span><\/strong><\/span><\/h2>\n<p style=\"margin-top: 0in; line-height: 150%; vertical-align: baseline;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">As more organizations turn to cloud computing, large data centers and cloud environments have opened new avenues for attack. Hackers are taking full advantage of the opportunities created by the dissolving security perimeter. As Manuel Nedbal explains in <\/span><a href=\"https:\/\/securityboulevard.com\/2018\/03\/welcome-to-the-era-of-cloud-insecurity-7-threats-unveiled\/\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">Security Boulevard<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">, \u201cWith cloud computing, the perimeter moves within these new environments into unprotected territory. Most companies have heavily invested in traditional multi-layer security appliances \u2013 such as firewalls and intrusion prevention systems (IPS) \u2013 that provide in-depth \u2018north-south\u2019 perimeter protection to guard against common cyberattacks. But these controls are less effective in securing lateral or \u2018east-west\u2019 traffic because they cannot move into public cloud environments and they were not designed to handle the sheer volume of cloud traffic, or forwarding the right traffic to them represents an operational hurdle.\u201d<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"margin-top: 0in; line-height: 150%; vertical-align: baseline;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\"><span style=\"color: black;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/07\/cloud-insecurity.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6568 alignleft\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/07\/cloud-insecurity.jpeg\" alt=\"\" width=\"300\" height=\"172\"><\/a><\/span><\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">Despite the continual publicity around repeated breaches and existing dangers and threats, many organizations are struggling to put adequate cloud cybersecurity measures in place. A CSA report states that, according to responses from enterprise security pros, the <\/span><a href=\"https:\/\/www.cloudcodes.com\/blog\/biggest-cloud-security-breaches-in-2018.html\" rel=\"nofollow\" target=\"_blank\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">top four cloud computing security challenges<\/span><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\"> are: <\/span><span style=\"font-size: 11pt; line-height: 150%; font-family: Arial, sans-serif; background: white;\">data visibility into compliance (43%), infrastructure security (43%), placing security policies (35%), and protection measures not kept on pace with regular updating (35%).<\/span><\/p>\n<p>\u00a0<\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11pt; line-height: 150%; font-family: Arial, sans-serif; background: white;\">Moving forward, experts believe cloud attacks will accelerate and grow in sophistication. While there is no silver bullet solution that will address every cloud security risk, industry collaboration and intelligent cybersecurity will enable better defenses and in turn greater business value from cloud innovations.<\/span><\/p>\n<h2 style=\"line-height: 150%;\"><span style=\"font-size: 16px;\"><strong><span style=\"line-height: 150%; font-family: Arial, sans-serif;\">3.<span style=\"font-style: normal; font-variant: normal; font-weight: normal; font-stretch: normal; line-height: normal; font-family: 'Times New Roman';\">\u00a0\u00a0\u00a0 <\/span><\/span><\/strong><strong><span style=\"line-height: 150%; font-family: Arial, sans-serif;\">User Awareness<\/span><\/strong><\/span><\/h2>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">User awareness can mean two things. The first being\u00a0private consumers\u00a0being aware of the threats that can be targeted towards\u00a0them. The second refers to business owners being aware of the potential risk that users of their\u00a0site, applications or online\u00a0services may pose.\u00a0In this sense, organizations must have user awareness of both their customers and their employees.<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/07\/user-awareness.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-6576\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2019\/07\/user-awareness.jpeg\" alt=\"\" width=\"300\" height=\"172\"><\/a><\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11pt; line-height: 150%; font-family: Arial, sans-serif;\">For private users, being aware of what type of scams are out there and being careful as to what information you give out and to whom means you will be better able to protect yourself against becoming a victim of phishing attacks and the like.\u00a0<\/span><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">In addition, downloading anti-virus and anti-malware software on all of your devices and setting up firewalls can help to add a robust layer of defense against cyberattacks.\u00a0<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-family: 'Arial',sans-serif;\">\u00a0<\/span><\/p>\n<p style=\"line-height: 150%;\"><span style=\"font-size: 11.0pt; line-height: 150%; font-family: 'Arial',sans-serif;\">For businesses, it is critical to make users aware of all the threats that are out there and to provide employees with appropriate training in order to protect the company. Employees may find themselves violating\u00a0the security code of conduct in a number of different scenarios, such as logging into unsecured public networks, using workplace devices for personal transactions, downloading unapproved applications, or sharing credentials. All of these things can lead to them falling prey to attacks, which is precisely why companies need to invest in educating their users as part of an ongoing strategy to up their cybersecurity for the remainder of 2019 and beyond.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Des Nnochiri \u00a0 From online banking, insuring cars, and shopping, we are almost totally reliant upon the internet to complete daily tasks and make our lives easier. \u00a0 However, as technological advancements give us greater convenience, increase productivity, and provide greater access to whole new swathes of entertainment, consumers and businesses alike leave themselves [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":6579,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,42],"tags":[788,804,803,28,800,255,796,677,797,318,266,787,794,789,268,127,273,802,317,798,272,790,805,795,260,792,793,29,332,270,799,333,108,791,801,226],"class_list":["post-6546","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-security","tag-788","tag-anti-malware-software","tag-anti-virus-software","tag-cloud","tag-cloud-attack","tag-cloud-computing","tag-cloud-insecurity","tag-cloud-security","tag-cloud-traffic","tag-cyber-attack","tag-cyber-security","tag-cybersecurity","tag-cybersecurity-program","tag-cybersecurity-trends","tag-data-security","tag-email-security","tag-firewall","tag-hack","tag-hacker","tag-infrastructure-security","tag-malware","tag-phishing","tag-phishing-attack","tag-phishing-simulator","tag-public-cloud","tag-scam","tag-scammer","tag-security","tag-security-awareness","tag-security-breach","tag-security-policies","tag-security-precautions","tag-security-threat","tag-targeted-phishing","tag-user-awareness","tag-virus"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6546","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=6546"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6546\/revisions"}],"predecessor-version":[{"id":6581,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/6546\/revisions\/6581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/6579"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=6546"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=6546"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=6546"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}