/
Cyber Resilience

3 Cybersecurity Predictions for 2020

With the decade rapidly coming to a close, I’ve been reflecting on 2019, a year wrought with massive, public breaches that illustrated hacker sophistication unlike anything we’ve ever seen before. Collection #1 exposed over 770 million unique email addresses and over 21 million passwords, the Capital One breach affected nearly 106 million U.S. and Canadian residents, and 540 million Facebook user records were exposed on AWS. And that’s just the tip of the iceberg. 

So, what can we expect to see in 2020? I suspect that attack methods will continue to become more nuanced and creative, leading to more detrimental exposures. Here are three specific predictions as we head into the new year that I hope will inspire you to think about security proactively.

1. We’ll start to hear more about the convergence of physical infiltration with cyberattacks, challenging security across the board.

Cyberattacks on an enterprise or a government can be carried out remotely but, in 2019, we started hearing more about the physical element added to the mix. Just look at the woman who had a thumb drive loaded with malware that got into Mar-a-Lago. Although she wasn’t able to successfully tap into the network, she still had a convincing enough story to get past physical checkpoints manned by the Secret Service.

And it doesn’t take sophisticated software or intelligence operations to execute these attacks — a well-planned, staged scenario is all it takes. For instance, someone could pose as an electrician to gain physical access to a hospital being built, walking around unimpeded until they find an unprotected device to access the network. I believe we’ll see more of these high-profile, hybrid cyber-physical attacks in 2020.

2. AI and speech technology will be exploited, making voice a new weapon of choice.

If there’s one thing that malicious actors are good at, it’s creativity. We’ll see business email compromise (BEC) extend further over into voice next year. Even though many organizations have educated employees on how to spot potential phishing emails, many aren’t ready for voice to do the same as they’re very believable and there really aren’t many effective, mainstream ways of detecting them. And while these types of “voishing” attacks aren’t new, we’ll see more malicious actors leveraging influential voices to execute attacks next year.

And it’s not as hard as it sounds — it’s easier than ever to get an audio clip of an executive, CEO, or world leader giving a speech and then altering it for nefarious purposes.

Imagine receiving an urgent call or voicemail from your “boss”, asking to share credentials for a secure platform or system. Without any packaged-up, off-the-shelf solutions to help detect these threats, we’re going to see a lot more voice-related attacks in 2020 that will be harder to identify and even harder to protect against.

3. Our sons and daughters will quickly become a new threat vector to enterprise security.

Almost everyone has a smart, connected device these days and kids are no exception. If they don’t have their own, they’ll probably just grab their parents’ phone or tablet to play games or watch TV – often unsupervised. As digital natives, technology is second nature to them but they’re not thinking about cybersecurity at all, which is why they’ll become prime targets.

Unfortunately, no one is off limits when it comes to cybersecurity threats and our kids will be squarely in the crosshairs next year. Whether it’s the child of an executive, an executive assistant, or even someone with administrative privileges, it only takes one wrong click for them to implant malware on their parent’s phone, opening up the back door for a bad actor to get into the company network. This will become much more prevalent in 2020.

Related topics

No items found.

Related articles

Ensure DORA Compliance: What You Need to Know
Cyber Resilience

Ensure DORA Compliance: What You Need to Know

Get the information you need to begin preparing to comply with the EU's upcoming DORA mandates for banking and financial services.

Data Center and Cloud Security — Why We Need a Revolution
Cyber Resilience

Data Center and Cloud Security — Why We Need a Revolution

Revolutions happen for good reason. They’re the result of a divergence of expectations and reality causing pent-up frustration that pushes the need for change. Old ways no longer align with new requirements and pressure reaches a boiling point where there is no other option but to make that change.

Preparing for DORA: Insights from 2 Cybersecurity Compliance Experts
Cyber Resilience

Preparing for DORA: Insights from 2 Cybersecurity Compliance Experts

Get insights from Tristan Morgan, managing director of cybersecurity at BT, and Mark Hendry, digital services partner at Evelyn Partners, on navigating DORA compliance.

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?