SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
6 CYBERSECURITY TRENDS TO WATCH IN 2019
Presented by
www.BluePay.com
6 Cybersecurity Trends To Watch In 2019	 BluePay | 2
It seems like every week there’s a new high-profile data breach
that dominates cybersecurity news headlines. Sometimes, these
stories bleed into the mainstream as well.
Not surprisingly, cybersecurity news tends to focus on the
biggest breaches — i.e., those affecting major corporations and
municipalities. In fact, these cybersecurity trends can (and do) affect
anyone, with 50 percent of all attacks targeting smaller businesses
that typically lack the security expertise to defend themselves.*
Moreover, these information security breaches will only get worse
as our lives become increasingly digitized. Already, society is
dangerously reliant on hyper-connected devices — from smart TVs
to driverless cars to automated manufacturing. Each of these
technologies creates another entry point for criminals and hackers.
This quickly changing landscape makes forecasting potential
threats very difficult, even among cybersecurity news experts
who closely follow emerging developments.
In just the past few years
alone, you’ve probably
heard about the following
cyberattacks:
• WannaCryand SamSam
ransomware attacks
• Deloitte and Equifax
data breaches
• Colorado Department
of Transportation hack
• Facebook and
Cambridge
Analytica breach
*Source: https://www.inc.com/joseph-steinberg/small-businesses-beware-half-of-all-cyber-attacks-target-you.html
OVERVIEW
FILELESS ATTACKS
6 Cybersecurity Trends To Watch In 2019	 BluePay | 3
With normal phishing, malicious code is downloaded and installed on a user’s hard drive
(usually after clicking on a suspicious link). As the name suggests, fileless attacks don’t rely
on downloaded “files.” Instead, they work by hijacking a computer’s existing infrastructure
before taking over core administrative functions. Basically, the user’s machine is turned
against itself.
Because all instructions are coming from trusted programs that are already installed on
the computer, fileless attacks are hard to detect. This is what makes them so effective –
and worrisome. According to some estimates, more than 75 percent of all cyberattacks
today are classified as “fileless.”*
*Source: https://www.barkly.com/ponemon-2018-endpoint-security-statistics-trends#form
6 Cybersecurity Trends To Watch In 2019	 BluePay | 4
Ransomware attacks aren’t new, but they enjoy tremendous staying power due to the genius
behind this particular type of hacking.
Ransomware targets vulnerabilities in unprotected machines (without requiring the user to
click on any links). Once a machine is compromised, malicious code is automatically downloaded
onto the user’s computer. The hacker essentially holds the machine (and data) hostage until the
victim pays a hefty “ransom” — usually via untraceable cryptocurrencies such as Bitcoin.
The WannaCry attack of 2017 is one of the best-known examples. It exploited holes in Windows
XP, an outdated operating system originally released in 2001.*
The best way to protect yourself from ransomware attacks is to keep all of your devices and
servers updated with the latest patches, operating systems and anti-virus software.
RANSOMWARE ATTACKS
*Source: https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html
6 Cybersecurity Trends To Watch In 2019	 BluePay | 5
With falling storage prices and ever-increasing Internet speeds, cloud-based technologies
are on the rise. They’re incredibly convenient, providing access anytime, anywhere for users
around the globe.
This is precisely what makes cloud-based infrastructure so attractive to hackers. Instead
of trying to break into millions of private computers, criminals need to focus on a single,
centralized chokepoint.
Protecting yourself from cloud-based attacks is difficult since you (as a user) don’t really
control the infrastructure involved, but it’s always a good idea to:
• Keep local backups of important data.
• Use secure passwords (that you change frequently).
• Share information only with trusted platforms.
CLOUD-BASED ATTACKS
MALICIOUS STATE ACTORS
6 Cybersecurity Trends To Watch In 2019	 BluePay | 6
The United States spends more on defense than China, Russia, Saudi Arabia, India, France,
United Kingdom, and Japan combined, making it very difficult for potential adversaries to
beat us on the battlefield. They’d have to spend many billions to close the gap.*
For a fraction of that investment, aggressive state actors can build an army of coders to hack
into America’s critical infrastructure (e.g., power grids, defense systems and nuclear reactors).
Credible reports suggest that Russia and China have already started doing precisely that in
recent years. If true, there’s no reason to believe such attempts will diminish in the near future.
Unfortunately, there is no real protection against this type of cyber threat. Just be sure you
keep plenty of flashlights, batteries and bottled water handy.
*Source: https://www.pgpf.org/chart-archive/0053_defense-comparison
Not all attacks stem from malicious intent. Sometimes, indifferent, unfeeling machines are
to blame.
For example, modern computers increasingly use artificial intelligence (AI) to spot patterns
or make surprisingly accurate predictions about the future.
However, the machine learning used to train AI programs usually happens in black box
environments. This makes it difficult (if not impossible) for the architects of these programs
to understand what is happening under the hood.
When all is well, there’s nothing to worry about. When things go south, there is no way to
correct the problem — unless you turn off AI entirely. That’s assuming the AI platforms of
tomorrow even respond to the stop buttons and safeguards we put in place today.
6 Cybersecurity Trends To Watch In 2019	 BluePay | 7
ARTIFICIAL INTELLIGENCE
This last type of cyber threat combines the two previous ones — state actors and artificial
intelligence. The 2016 U.S. presidential election has already demonstrated the deadly potency
of this combination.
Online users were inundated with fake news that, many believed, helped sway the election.
This trend was especially pronounced on Facebook, but no corner of the Internet was
completely immune.
The technology is only getting better (or worse?), with bots able to auto-generate realistic-
looking articles in mere seconds. These articles are then amplified by fake social media
accounts that help like, share, and spread the news like wildfire.
It’s also now possible to create realistic-looking videos of events and conversations that
never happened. Against this backdrop, blackmail, extortion and character assassination are
inevitable. When guided by bad actors, artificial intelligence has the power to make anybody
believe anything.
Worst of all, there is currently zero defense against this emerging threat.
6 Cybersecurity Trends To Watch In 2019	 BluePay | 8
FAKE NEWS
As a business owner, there are common sense strategies you can implement to make
yourself less of a target.
For example, you should closely follow cybersecurity news on a regular basis. The more
you know about emerging information security trends, the better equipped you’ll be to
avoid them.
Additionally, you should:
• Stay away from public hotspots
• Contain data storage to secure devices and platforms
• Manage and update passwords often
• Use a reliable e-commerce payment solution
• Implement proper security layers within your software
6 Cybersecurity Trends To Watch In 2019	 BluePay | 9
PROTECTING YOURSELF AGAINST
THESE CYBERSECURITY TRENDS
844-556-8546 / getstarted@bluepay.com	
HOW CAN WE HELP YOU?
Visit Our BlogContact BluePay

Weitere ähnliche Inhalte

Was ist angesagt?

Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Valerie Lanzone
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity PredictionsMatthew Rosenquist
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsKory Edwards
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18Symantec
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?Brian K. Dickard
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Interlat
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSPaul Walsh
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
The Web Hacking Incidents Database Annual
The Web Hacking Incidents Database AnnualThe Web Hacking Incidents Database Annual
The Web Hacking Incidents Database Annualguest376352
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideRoen Branham
 
Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack ZeroFOX
 

Was ist angesagt? (20)

Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?Supersized Security Threats – Can You Stop 2016 from Repeating?
Supersized Security Threats – Can You Stop 2016 from Repeating?
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Mobile threat report_q3_2013
Mobile threat report_q3_2013Mobile threat report_q3_2013
Mobile threat report_q3_2013
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
Cyber Threat to Public Safety Communications
Cyber Threat to Public Safety CommunicationsCyber Threat to Public Safety Communications
Cyber Threat to Public Safety Communications
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Estado del ransomware en 2020
Estado del ransomware en 2020Estado del ransomware en 2020
Estado del ransomware en 2020
 
ISTR Volume 18
ISTR Volume 18ISTR Volume 18
ISTR Volume 18
 
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?There's a Crippling Cyber Attack Coming Your Way!  Are we prepared to stop it?
There's a Crippling Cyber Attack Coming Your Way! Are we prepared to stop it?
 
Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...Presentación - Protecting your Employess, Customers, and Investments in the A...
Presentación - Protecting your Employess, Customers, and Investments in the A...
 
Enabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMSEnabling a Zero Trust strategy for SMS
Enabling a Zero Trust strategy for SMS
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
The Web Hacking Incidents Database Annual
The Web Hacking Incidents Database AnnualThe Web Hacking Incidents Database Annual
The Web Hacking Incidents Database Annual
 
Grift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a rideGrift horse money stealing trojan takes 10m android users for a ride
Grift horse money stealing trojan takes 10m android users for a ride
 
Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack Anatomy of an Enterprise Social Cyber Attack
Anatomy of an Enterprise Social Cyber Attack
 

Ähnlich wie 6 Cybersecurity Trends to Watch in 2019

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safeCAST
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperKen Spencer Brown
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictionscentralohioissa
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptxBetaBeta9
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityAlistair Blake
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019Omar Bshara
 

Ähnlich wie 6 Cybersecurity Trends to Watch in 2019 (20)

1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Why computers will never be safe
Why computers will never be safeWhy computers will never be safe
Why computers will never be safe
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
Qrator Labs annual report 2017
Qrator Labs annual report 2017Qrator Labs annual report 2017
Qrator Labs annual report 2017
 
5 main trends in cyber security for 2020
5 main trends in cyber security for 20205 main trends in cyber security for 2020
5 main trends in cyber security for 2020
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
proofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paperproofpoint-blindspots-visibility-white-paper
proofpoint-blindspots-visibility-white-paper
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Final Presentation.pptx
Final Presentation.pptxFinal Presentation.pptx
Final Presentation.pptx
 
CC_Futureinc_Cyber Security
CC_Futureinc_Cyber SecurityCC_Futureinc_Cyber Security
CC_Futureinc_Cyber Security
 
Cyber Security Report 2019
Cyber Security Report 2019Cyber Security Report 2019
Cyber Security Report 2019
 

Kürzlich hochgeladen

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Kürzlich hochgeladen (20)

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

6 Cybersecurity Trends to Watch in 2019

  • 1. 6 CYBERSECURITY TRENDS TO WATCH IN 2019 Presented by www.BluePay.com
  • 2. 6 Cybersecurity Trends To Watch In 2019 BluePay | 2 It seems like every week there’s a new high-profile data breach that dominates cybersecurity news headlines. Sometimes, these stories bleed into the mainstream as well. Not surprisingly, cybersecurity news tends to focus on the biggest breaches — i.e., those affecting major corporations and municipalities. In fact, these cybersecurity trends can (and do) affect anyone, with 50 percent of all attacks targeting smaller businesses that typically lack the security expertise to defend themselves.* Moreover, these information security breaches will only get worse as our lives become increasingly digitized. Already, society is dangerously reliant on hyper-connected devices — from smart TVs to driverless cars to automated manufacturing. Each of these technologies creates another entry point for criminals and hackers. This quickly changing landscape makes forecasting potential threats very difficult, even among cybersecurity news experts who closely follow emerging developments. In just the past few years alone, you’ve probably heard about the following cyberattacks: • WannaCryand SamSam ransomware attacks • Deloitte and Equifax data breaches • Colorado Department of Transportation hack • Facebook and Cambridge Analytica breach *Source: https://www.inc.com/joseph-steinberg/small-businesses-beware-half-of-all-cyber-attacks-target-you.html OVERVIEW
  • 3. FILELESS ATTACKS 6 Cybersecurity Trends To Watch In 2019 BluePay | 3 With normal phishing, malicious code is downloaded and installed on a user’s hard drive (usually after clicking on a suspicious link). As the name suggests, fileless attacks don’t rely on downloaded “files.” Instead, they work by hijacking a computer’s existing infrastructure before taking over core administrative functions. Basically, the user’s machine is turned against itself. Because all instructions are coming from trusted programs that are already installed on the computer, fileless attacks are hard to detect. This is what makes them so effective – and worrisome. According to some estimates, more than 75 percent of all cyberattacks today are classified as “fileless.”* *Source: https://www.barkly.com/ponemon-2018-endpoint-security-statistics-trends#form
  • 4. 6 Cybersecurity Trends To Watch In 2019 BluePay | 4 Ransomware attacks aren’t new, but they enjoy tremendous staying power due to the genius behind this particular type of hacking. Ransomware targets vulnerabilities in unprotected machines (without requiring the user to click on any links). Once a machine is compromised, malicious code is automatically downloaded onto the user’s computer. The hacker essentially holds the machine (and data) hostage until the victim pays a hefty “ransom” — usually via untraceable cryptocurrencies such as Bitcoin. The WannaCry attack of 2017 is one of the best-known examples. It exploited holes in Windows XP, an outdated operating system originally released in 2001.* The best way to protect yourself from ransomware attacks is to keep all of your devices and servers updated with the latest patches, operating systems and anti-virus software. RANSOMWARE ATTACKS *Source: https://www.csoonline.com/article/3227906/ransomware/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html
  • 5. 6 Cybersecurity Trends To Watch In 2019 BluePay | 5 With falling storage prices and ever-increasing Internet speeds, cloud-based technologies are on the rise. They’re incredibly convenient, providing access anytime, anywhere for users around the globe. This is precisely what makes cloud-based infrastructure so attractive to hackers. Instead of trying to break into millions of private computers, criminals need to focus on a single, centralized chokepoint. Protecting yourself from cloud-based attacks is difficult since you (as a user) don’t really control the infrastructure involved, but it’s always a good idea to: • Keep local backups of important data. • Use secure passwords (that you change frequently). • Share information only with trusted platforms. CLOUD-BASED ATTACKS
  • 6. MALICIOUS STATE ACTORS 6 Cybersecurity Trends To Watch In 2019 BluePay | 6 The United States spends more on defense than China, Russia, Saudi Arabia, India, France, United Kingdom, and Japan combined, making it very difficult for potential adversaries to beat us on the battlefield. They’d have to spend many billions to close the gap.* For a fraction of that investment, aggressive state actors can build an army of coders to hack into America’s critical infrastructure (e.g., power grids, defense systems and nuclear reactors). Credible reports suggest that Russia and China have already started doing precisely that in recent years. If true, there’s no reason to believe such attempts will diminish in the near future. Unfortunately, there is no real protection against this type of cyber threat. Just be sure you keep plenty of flashlights, batteries and bottled water handy. *Source: https://www.pgpf.org/chart-archive/0053_defense-comparison
  • 7. Not all attacks stem from malicious intent. Sometimes, indifferent, unfeeling machines are to blame. For example, modern computers increasingly use artificial intelligence (AI) to spot patterns or make surprisingly accurate predictions about the future. However, the machine learning used to train AI programs usually happens in black box environments. This makes it difficult (if not impossible) for the architects of these programs to understand what is happening under the hood. When all is well, there’s nothing to worry about. When things go south, there is no way to correct the problem — unless you turn off AI entirely. That’s assuming the AI platforms of tomorrow even respond to the stop buttons and safeguards we put in place today. 6 Cybersecurity Trends To Watch In 2019 BluePay | 7 ARTIFICIAL INTELLIGENCE
  • 8. This last type of cyber threat combines the two previous ones — state actors and artificial intelligence. The 2016 U.S. presidential election has already demonstrated the deadly potency of this combination. Online users were inundated with fake news that, many believed, helped sway the election. This trend was especially pronounced on Facebook, but no corner of the Internet was completely immune. The technology is only getting better (or worse?), with bots able to auto-generate realistic- looking articles in mere seconds. These articles are then amplified by fake social media accounts that help like, share, and spread the news like wildfire. It’s also now possible to create realistic-looking videos of events and conversations that never happened. Against this backdrop, blackmail, extortion and character assassination are inevitable. When guided by bad actors, artificial intelligence has the power to make anybody believe anything. Worst of all, there is currently zero defense against this emerging threat. 6 Cybersecurity Trends To Watch In 2019 BluePay | 8 FAKE NEWS
  • 9. As a business owner, there are common sense strategies you can implement to make yourself less of a target. For example, you should closely follow cybersecurity news on a regular basis. The more you know about emerging information security trends, the better equipped you’ll be to avoid them. Additionally, you should: • Stay away from public hotspots • Contain data storage to secure devices and platforms • Manage and update passwords often • Use a reliable e-commerce payment solution • Implement proper security layers within your software 6 Cybersecurity Trends To Watch In 2019 BluePay | 9 PROTECTING YOURSELF AGAINST THESE CYBERSECURITY TRENDS
  • 10. 844-556-8546 / getstarted@bluepay.com HOW CAN WE HELP YOU? Visit Our BlogContact BluePay