2020 cybersecurity predictions

2020 cybersecurity predictions

We’ve had a predictably unpredictable year for cybercrime in 2019, though many of the issues we were concerned about heading into the year turned out to be justified by increased activity or efforts to exploit, infect, collect, and blackmail users and their systems. So, what about 2020? Is it going to be different? We’ve collected six highly likely predictions for the next 12 months, based on what we’ve seen in the past and what we’re most afraid of in the future.

No alt text provided for this image

 Ransomware attacks on organizations will continue at a more rapid pace, thanks to a diversification in attack vectors.

 Over the last two years, malware developers have turned their focus to business targets over consumers, and ransomware is the threat of choice. While in the past, ransomware was typically delivered via exploit, 2019 saw a huge diversity in attack vectors dropping their favorite malware on organizations’ endpoints, from exploit kits to botnets to hacking tools and manual infection. We saw more vulnerabilities in 2017 and 2018 than in any year before, and 2019 was a close match in volume.

 More vulnerabilities means more exploits, and we’re likely to see some of the 43,000 vulnerabilities discovered over the last two years show up in future EK offerings. We saw an example of this with BlueKeep, a software vulnerability that affects older versions of Microsoft Windows. It attacks an operating system’s Remote Desktop Protocol (RDP), which connects to another computer over a network connection to quickly spread.

 We’ve seen so much Emotet and TrickBot in the last two years—often the precursors to ransomware payloads— we’ve starting saying their names in our sleep. The “triple threat” attack model has proven so effective, we expect even more Trojans and droppers and downloaders and botnets to join the party in 2020, offering affiliates a multitude of options for multi-stage attacks.

A good backup and disaster recover system will mittigate system downtime and cost keeping your IT system online.

 Finally, the development and prevalence of malicious hacking tools designed to more effectively attack networks will surely attract ransomware authors and affiliates to first penetrate, then decimate business infrastructures in 2020. Bottom line, this ransomware problem isn’t going away. We are likely to see more non-affiliated cybercriminals using tricks developed by state-sponsored malware groups (APT), as we did with EternalBlue. And if we do, we’re in for a turbulent year of cybercrime.

Its not IF but when will your business experience a cyber attack? A secure IT network is a reliable and efficient network.

Are you having constant issues with your IT not working or still running windows 7....perhaps its time to consider moving IT providers.

No alt text provided for this image

Andrew James - Regional Sales Director - Computeam MSP

www.computeam-msp.co.uk

Tel 0800 862 0123

要查看或添加评论,请登录

Andrew James的更多文章

  • Software migration into Agile Apps

    Software migration into Agile Apps

    The software industry is undergoing constant development. Accompanying this change are the growing needs of your…

    1 条评论
  • The Modern Workplace: Secure collaboration tools for everyone

    The Modern Workplace: Secure collaboration tools for everyone

    With the growth of video conferencing and online interactions rather than face-to-face, many businesses have had to…

  • What is Cyber Essentials?

    What is Cyber Essentials?

    Cyber Essentials helps organisations safeguard against the most common cyber threats and demonstrates to your clients…

  • Hackers use coronavirus anxiety to target the healthcare industry

    Hackers use coronavirus anxiety to target the healthcare industry

    Fears over the coronavirus have hit healthcare industries where convincing-looking emails from the World Health…

  • Getting your business IT ready for GDPR

    Getting your business IT ready for GDPR

    What makes soVision IT different from other IT providers? Our clients benefit from services that take the headache out…

  • Free Virtual Machine Backup Software

    Free Virtual Machine Backup Software

    Most businesses in and around Bath and Bristol use virtualization in some shape or form. When it comes to backing up…

  • Security Update from Eye-Tech IT – Operation Zephyr

    Security Update from Eye-Tech IT – Operation Zephyr

    Eye-Tech IT wants to prevent your business being the next victim of cybercrime. The average value from cyber fraud and…

  • Bath Internet event - Today 4pm

    Bath Internet event - Today 4pm

    This afternoon business leaders will be coming together to discuss the lack of Super Fast Internet connectivity for the…

  • Bath's Business Leaders - Internet Summit

    Bath's Business Leaders - Internet Summit

    Still some places left at tomorrow's Broadband 'Question Time' event with Bath MP Ben Howlett, The leader of BANES…

  • Productivity, Security & Spam

    Productivity, Security & Spam

    There was a time when spam was considered little more than an invasive annoyance. It was merely an attempt, albeit an…

    1 条评论

社区洞察

其他会员也浏览了