Ambler, Pennsylvania
117 E Butler Ave
Ambler, PA 19002
(215) 343-5580

2019 is Already Shaping Up to be a Cybersecurity Headache For Businesses December 10, 2018

Ambler, Montgomery County
2019 is Already Shaping Up to be a Cybersecurity Headache For Businesses, Ambler, Pennsylvania

Cyber security’s 2018 megatrends and myriad emerging threats have created the perfect storm for a tumultuous 2019. From never-before-seen attacks on newly engineered biometric markers and the broad embrace of the blockchain to expanded risks posed for “new” critical infrastructure and the transfer of trust, organizations must look to the threat horizon, and accelerate and collaborate to out-innovate and out-maneuver the attackers.

As we head into 2019, here are five security predictions to prepare for:

1. Prediction: Emerging ‘Unique Human Identities’ Under Attack

We’ll see a new wave of attacks against emerging ‘unique human identities’ – or newly engineered biometric markers for digital and physical authentication. Biometric fingerprint, voice and face ID authentication controls have proven effective in consumer devices, and organizations will look to new authentication methods – like embedded human microchips, for example. Attackers will increasingly target these identities to gather massive amounts of biometric data for future modeling purposes and nefarious use. Genetic consumer-services, biometric stores within organizations and more will become key targets, further elevating privacy concerns.

 2. Prediction: Government Social Media Becomes Regulated as Critical Infrastructure

Governments will start counting government-sanctioned social media accounts – both for elected officials and agencies – as critical infrastructure. Much like government text messages are regulated in numerous ways, social media will become regulated as well.

Social media has emerged as a critical tool for governments to communicate with citizens. Whether it’s individual politicians and elected officials, or the official accounts of government agencies and organizations, social media is quickly emerging as one of the top pathways for a government to communicate with citizens.

While social media allows for the rapid dissemination of critical information, it also has a dark side, illustrated in the past year by the false missile alerts that sent residents of Hawaii and Japan into a panic. This provides a glimpse of how attackers could use official social accounts to spread chaos.

 3. Prediction: Trade Wars Trigger Commercial Espionage

Government policies designed to create ‘trade wars’ will trigger a new round of nation-state attacks designed to steal intellectual property and other trade secrets to gain competitive market advantages. Nation-state attackers will combine existing, unsophisticated, yet proven, tactics with new techniques to exfiltrate IP, as opposed to just targeting PII or other sensitive data.

While these attacks will predominantly be carried out by malicious external attackers, we’ll also see an uptick of insider attacks, especially in cutting-edge industries like autonomous cars (much like occurred at Apple in June 2018). We’ll see attacker dwell times extend as nation-states spend more time conducting reconnaissance and carrying out these trade-driven attacks. We’ll also see the emergence of nation-state weapons commercialized on the black market. This same phenomenon happened after Stuxnet, Petya, and NotPetya – where cybercriminals take pieces of code from massive nation-state attacks and incorporate them into their attacks.

 4. Prediction: Supply Chain Meets Blockchain

Blockchain will transform the supply chain in 2019. Following allegations of nation-states targeting the supply chain at the chip level to embed backdoors into both B2B and consumer technologies, organizations will embrace blockchain to secure their supply chains. The distributed nature of blockchain makes it well suited to validate every step in the supply chain – including the authenticity of hardware and software. We’ll continue to see increased attacks early on in the supply chain, and there will be a greater need for this level of validation.

 5.  Prediction: Enterprises Transfer Trust and Risk…to Google and Facebook?
The embrace of Google’s BeyondCorp strategy – shifting access controls from the network perimeter to individual users and devices without the need for a traditional VPN – will expand the attack surface in 2019 if the necessary controls are not put in place. This ‘zero trusts’ approach can open up several attack vectors. First, it transfers risk and trust to third parties, like Google or Facebook, with velocity. Identity providers are exposed to an expanding attack surface through the use of authentication protocols and short-lived tokens or temporary API keys that can be compromised. This transfer of trust also opens up the very real possibility of attackers weaponizing identity provider assets or services to expose credentials or allow privileged access.

Other Announcements, Events and Deals from Communications Deployment Partners
Should I Consider SD-WAN for My Business?, Ambler, Pennsylvania
Does your business have multiple locations, remote sites, ore a network of branch offices? Are you increasingly relying on cloud services? Is your business Wi-Fi simply not doing more
What Is SIP Trunking?, Ambler, Pennsylvania
Communication plays an integral role in business success and will always be a foundation in the workplace. If you’re like many business owners, understanding the world of new tech more
Cyber Security Tips for Business Owners , Ambler, Pennsylvania
Were you aware that October is Cybersecurity Awareness Month? Held every October, it is a collaborative effort between government and industry to raise awareness about the more
3 Benefits of Using a Cloud Phone System, Ambler, Pennsylvania
Business cloud services add countless possibilities to the workplace. Improving your phone system is one of the best ways to start. VoIP integrations work via the cloud and offer more
Disaster at Work? 4 Ways to Ensure Business Continuity, Ambler, Pennsylvania
In the wake of a disaster, such as a data breach or inclement weather event, you may experience commercial interruptions, leading to lost revenue and unexpected expenses. more