Ambler, Pennsylvania
117 E Butler Ave
Ambler, PA 19002
(215) 343-5580

2019 is Already Shaping Up to be a Cybersecurity Headache For Businesses December 10, 2018

Ambler, Montgomery County
2019 is Already Shaping Up to be a Cybersecurity Headache For Businesses, Ambler, Pennsylvania

Cyber security’s 2018 megatrends and myriad emerging threats have created the perfect storm for a tumultuous 2019. From never-before-seen attacks on newly engineered biometric markers and the broad embrace of the blockchain to expanded risks posed for “new” critical infrastructure and the transfer of trust, organizations must look to the threat horizon, and accelerate and collaborate to out-innovate and out-maneuver the attackers.

As we head into 2019, here are five security predictions to prepare for:

1. Prediction: Emerging ‘Unique Human Identities’ Under Attack

We’ll see a new wave of attacks against emerging ‘unique human identities’ – or newly engineered biometric markers for digital and physical authentication. Biometric fingerprint, voice and face ID authentication controls have proven effective in consumer devices, and organizations will look to new authentication methods – like embedded human microchips, for example. Attackers will increasingly target these identities to gather massive amounts of biometric data for future modeling purposes and nefarious use. Genetic consumer-services, biometric stores within organizations and more will become key targets, further elevating privacy concerns.

 2. Prediction: Government Social Media Becomes Regulated as Critical Infrastructure

Governments will start counting government-sanctioned social media accounts – both for elected officials and agencies – as critical infrastructure. Much like government text messages are regulated in numerous ways, social media will become regulated as well.

Social media has emerged as a critical tool for governments to communicate with citizens. Whether it’s individual politicians and elected officials, or the official accounts of government agencies and organizations, social media is quickly emerging as one of the top pathways for a government to communicate with citizens.

While social media allows for the rapid dissemination of critical information, it also has a dark side, illustrated in the past year by the false missile alerts that sent residents of Hawaii and Japan into a panic. This provides a glimpse of how attackers could use official social accounts to spread chaos.

 3. Prediction: Trade Wars Trigger Commercial Espionage

Government policies designed to create ‘trade wars’ will trigger a new round of nation-state attacks designed to steal intellectual property and other trade secrets to gain competitive market advantages. Nation-state attackers will combine existing, unsophisticated, yet proven, tactics with new techniques to exfiltrate IP, as opposed to just targeting PII or other sensitive data.

While these attacks will predominantly be carried out by malicious external attackers, we’ll also see an uptick of insider attacks, especially in cutting-edge industries like autonomous cars (much like occurred at Apple in June 2018). We’ll see attacker dwell times extend as nation-states spend more time conducting reconnaissance and carrying out these trade-driven attacks. We’ll also see the emergence of nation-state weapons commercialized on the black market. This same phenomenon happened after Stuxnet, Petya, and NotPetya – where cybercriminals take pieces of code from massive nation-state attacks and incorporate them into their attacks.

 4. Prediction: Supply Chain Meets Blockchain

Blockchain will transform the supply chain in 2019. Following allegations of nation-states targeting the supply chain at the chip level to embed backdoors into both B2B and consumer technologies, organizations will embrace blockchain to secure their supply chains. The distributed nature of blockchain makes it well suited to validate every step in the supply chain – including the authenticity of hardware and software. We’ll continue to see increased attacks early on in the supply chain, and there will be a greater need for this level of validation.

 5.  Prediction: Enterprises Transfer Trust and Risk…to Google and Facebook?
The embrace of Google’s BeyondCorp strategy – shifting access controls from the network perimeter to individual users and devices without the need for a traditional VPN – will expand the attack surface in 2019 if the necessary controls are not put in place. This ‘zero trusts’ approach can open up several attack vectors. First, it transfers risk and trust to third parties, like Google or Facebook, with velocity. Identity providers are exposed to an expanding attack surface through the use of authentication protocols and short-lived tokens or temporary API keys that can be compromised. This transfer of trust also opens up the very real possibility of attackers weaponizing identity provider assets or services to expose credentials or allow privileged access.

Other Announcements, Events and Deals from Communications Deployment Partners
How Is the Cloud Changing the Retail Industry?, Ambler, Pennsylvania
Cloud services are something many office workers are familiar with. However, the cloud’s usefulness is recognized in many industries. The retail sector is also reaping the benefits, more
Why SD-WAN?, Ambler, Pennsylvania
For most businesses, switching their network technology can be a burden to take on. Therefore, many questions arise in regards to switching to SD-WAN. Is it worth it? Will it save more
The Most Overlooked Component of Business Continuity , Ambler, Pennsylvania
Business leaders meticulously plan for future growth and expansion but are often caught off-guard by disasters. Local storms, fires, power, and network outages continuously wreak more
Cybersecurity: Statistics You Should Know, Ambler, Pennsylvania
There have been many cyber issues and threats that the world has experienced over the years. Part of living in the digital era is understanding that private information is more more
3 Advantages of a Business Phone Service Upgrade, Ambler, Pennsylvania
If you’re looking to boost your company’s productivity, reduce overhead expenses, and improve client relations, a business phone service is a wise investment. With convenient more