Our Senior Solutions Consultant Mark Carragher takes a look at the Top 10 Cyber Threats & Concerns for the coming year.
SHADOW IT SYSTEMS
Shadow IT is software used within an organisation, but not supported by the company’s central IT system. This has inefficiencies and may be vulnerable to hackers. Organisations need to be aware of the security threat that shadow IT brings.
SINGLE FACTOR PASSWORDS
There is a large security risk in use of single-factor passwords as it gives intruders easy access to data. In 2020, organisations need to be more serious with the passwords by starting to use multi-factor authentication.
Cloud storage is vulnerable to cyber abuse. With inadequate authentication and registration processes, the cloud will be susceptible to spam emails, criminals, and other malicious attacks. An adequate way of monitoring credit card transactions is also needed.
As cloud data storage is becoming more popular than ever, many organisations are transferring their data to the cloud. This isn’t as safe as it sounds, and organisations need to be picky when it comes to choosing a cloud provider.
Ex-staff are a major threat to cybersecurity, while users in organisations are also a weak link. Thus, organisations need to remedy this problem by educating the staff on cyber, monitoring their activities, and testing.
A cloud service provider’s interface is shared among different users. Thus, the security lies primarily in the hands of the service providers, as breaches could happen starting from the authentication to encryption process.
Malware attacks can be caused by various reasons, including removable media, file sharing, bundled free software, and the lack of internet security software. To overcome them, organisations need to prepare a strict security mechanism and compliance.
LOSS OF DATA
Organisations need to ensure that the available API security is tight to avoid loss of data as it may lead to serious implications on the business. Such a breach can drain the organisation’s finances and cause a loss of customers.
As the Internet of Things takes over, more weak points are created in the computer systems. Besides administer restrictions towards sharing, organisations also need to ensure that no unauthorised activity takes place.
INTERNET OF THINGS
Most devices are connected to the Internet nowadays. As much as the Internet of Things has become useful, its deployment has also brought many concerns, especially in security domain due to inadequate security measures.