Our Senior Solutions Consultant Mark Carragher takes a look at the Top 10 Cyber Threats & Concerns for the coming year.

SHADOW IT SYSTEMS

Shadow IT is software used within an organisation, but not supported by the company’s central IT system. This has inefficiencies and may be vulnerable to hackers. Organisations need to be aware of the security threat that shadow IT brings.

 

SINGLE FACTOR PASSWORDS

There is a large security risk in use of single-factor passwords as it gives intruders easy access to data. In 2020, organisations need to be more serious with the passwords by starting to use multi-factor authentication.

 

CLOUD ABUSE

Cloud storage is vulnerable to cyber abuse. With inadequate authentication and registration processes, the cloud will be susceptible to spam emails, criminals, and other malicious attacks. An adequate way of monitoring credit card transactions is also needed.

 

DATA BREACH

As cloud data storage is becoming more popular than ever, many organisations are transferring their data to the cloud. This isn’t as safe as it sounds, and organisations need to be picky when it comes to choosing a cloud provider.

 

INSIDER THREATS

Ex-staff are a major threat to cybersecurity, while users in organisations are also a weak link. Thus, organisations need to remedy this problem by educating the staff on cyber, monitoring their activities, and testing.

 

INSECURE API

A cloud service provider’s interface is shared among different users. Thus, the security lies primarily in the hands of the service providers, as breaches could happen starting from the authentication to encryption process.

 

MALWARE ATTACK

Malware attacks can be caused by various reasons, including removable media, file sharing, bundled free software, and the lack of internet security software. To overcome them, organisations need to prepare a strict security mechanism and compliance.

 

LOSS OF DATA

Organisations need to ensure that the available API security is tight to avoid loss of data as it may lead to serious implications on the business. Such a breach can drain the organisation’s finances and cause a loss of customers.

 

HACKING

As the Internet of Things takes over, more weak points are created in the computer systems. Besides administer restrictions towards sharing, organisations also need to ensure that no unauthorised activity takes place.

 

INTERNET OF THINGS

Most devices are connected to the Internet nowadays. As much as the Internet of Things has become useful, its deployment has also brought many concerns, especially in security domain due to inadequate security measures.