Information Security Trends And Problems In 2019

Cybercrime creates a lot of problems to ordinary users, but it also creates new careers. According to the forecast of Cybersecurity Ventures 3.5 million new careers shall show up in the infosec sector within the next four years. It is 3.5 times more vacancies than we have now. The security industry is experiencing a genuine boom. For example, in america, the number of InfoSec vacancies increased from 209K to 350K or 67% in 2015-2017. Similar processes are occurring far away.

Information security is certainly increasing. But this gold coin has two edges. The above statistics do not imply that networks and devices will become safer and better covered, vice versa possibly. Every day, the given information security industry tries to battle new threats. The number of hackers, cybercrime, malware, espionage, and data breaches is growing considerably faster than the amount of “defenders” from the InfoSec side. Not forgetting the fact that the technical qualifications of black-hat hackers often surpass the qualifications of these security specialists who research computer security at the university or college. Hackers creatively use new technology and come up with new attacks vectors constantly.

What problems does it security specialists face in the near future? Extortion viruses are still one of the quickest growing areas of cybercrime. The number of attacks in 2017 increased by 36% and the damage from them has doubled. Experts do not forecast a reduction in their activity, attacks shall only increase.

Unfortunately, many companies still do not envisage the worst-case situation. 20% of companies don’t have a disaster recovery plan at all and don’t make data backups on regular basis. From data encrypting malware Aside, cyber criminals start DDoS for ransom campaigns knocking off victims’ websites until they pay.

One of the very most promising protection strategies is the usage of data mining and self-learning systems that are essentially Artificial Intelligence applications. Statista has compiled a table of the most encouraging AI development vectors. 48.5 billion. One of the most promising areas are the identification of static images, algorithmic trading, and data management in healthcare.

2.47 billion will be spent on the development of such systems, based on the forecast. This is a considerable amount. Traditionally, information security specialists respond to attacks post factum. Automated systems of the new generation will be able to analyze logs and traffic instantly. Theoretically, malicious programs should be blocked before these are uploaded to the server.

  1. Giving your customers the most significant, memorable experience possible
  2. The level of improvements
  3. Advise clients regarding the amount and type of funds that may be raised, and the price thereof
  4. High levels of proactivity, self-organisation, and self-motivation

Of course, it is impossible to achieve the best result with no participation of the human being. The AI system is only an auxiliary tool here. Its effectiveness depends upon the qualifications of the specialists who set up the system, monitor its work, and analyze the results. The number of devices in the possession of individuals is and rapidly growing constantly.

Almost every household has several smartphones and tablets, a number of computers, an Internet-connected TV or a streaming media device. And this is only the start. Voice assistants that utilize talk recognition like Amazon Google or Echo Home have become increasingly more popular. Such devices can order a pizza, call a taxi, play music, tell you the news, inform about the elements or traffic conditions. Even refrigerators become “smart” and can order fresh milk if it expires.

The problem is that virtually all new types of IoT devices are usually worse guarded from hacking than standard computers. A couple of years ago, HP’s research uncovered that 70% of IoT devices have serious security problems. The problem have not transformed much since then. Blockchain – a decentralized and secure transaction record can be used in various areas of information technology. What does this mean for information security? Experts do not answer this question clearly, but they make some assumptions.