[et_pb_section fb_built=”1″ fullwidth=”on” _builder_version=”3.19.14″ background_position=”center_right” background_blend=”darken” custom_padding=”0px|60px|0px|59px|false|false”][et_pb_fullwidth_header title=”Three Things to Know About Cybersecurity in 2019″ text_orientation=”center” background_overlay_color=”rgba(0,0,0,0.42)” title_font_color=”#ffffff” _builder_version=”3.19.14″ title_font=”||||||||” title_text_color=”#ffffff” title_font_size=”39px” subhead_font=”||||||||” subhead_text_color=”#ffffff” subhead_font_size=”19px” background_color=”rgba(255,255,255,0)” background_layout=”light” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off” background_image=”https://www.mdsny.com/wp-content/uploads/2019/02/https___blogs-images.forbes.com_moorinsights_files_2019_02_Picture1-4.png”][/et_pb_fullwidth_header][/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”3.0.65″ custom_padding=”12px|0px|0px|0px”][et_pb_row make_fullwidth=”on” custom_padding=”27px|1px|0px|2px” custom_margin=”-22px||” _builder_version=”3.19.14″][et_pb_column type=”4_4″ _builder_version=”3.0.47″][et_pb_text _builder_version=”3.19.14″ text_font=”||||||||” text_text_color=”#000000″ text_font_size=”15px” header_font=”||||||||”]

Every year, it seems, pundits and egg-heads (like me) write down our predictions. Most of the time they are self-serving. However, looking into my crystal ball, I think 2019 is going to be a defining year at the intersection of physical and cybersecurity. The Internet of Things (IoT) and advances in artificial intelligence are some of the main driving forces in this evolution. Further, with chaos happening throughout the world, and the lead-up to a turbulent US presidential election, there has never been a more perilous—and opportunistic—time for those in the IoT and security business.

The 5th generation of warfare is here

2019 will be the year of the state-level hacker and cracker. Hacking has become an industry unto itself, forcing organizations to deal with everything from malware, social engineering, and viruses, to full-on cyberwarfare attacks against enterprises and governments. In short, we are living in dangerous times. Companies must move beyond just virus protection as their first line of defense. Attacks are becoming more and more sophisticated, and while companies can’t keep up, they can mitigate the damage caused. 2019 will be the year where major state-level breaches will happen and governments, businesses, and consumers will show how woefully unprepared they are—much like when Russia declared cyberwar on Ukraine in 2015. For years, most organizations and governments have only prepared for digital mayhem, ignoring the real potential damage “bad actors” can cause. Put bluntly, organizations have been reactive, not proactive, when it comes to cybersecurity—especially at the edge.

Ukrainian history is only a small showcase of things to come. On multiple occasions, bad actors or saboteurs from Russia disrupted critical infrastructure, countrywide, including power/energy, transportation, financial, media, military, and government systems. These attacks literally paralyzed Ukraine, allowing Russian troops to take over the country without firing a shot. Nearly 7,000 cyber-attacks were launched at over 35 targets over a 2-month timeframe, causing irreversible damage to the country’s infrastructure. These attacks were relatively simple, using spear-phishing malware attacks (BlackEnergy) within energy and other critical systems. Other attacks were more direct, through HVAC, supervisory control and data acquisition (SCADA) systems, meters/submeters, and other hardware-based attack vectors.

Bottom line, 2019 will likely see the most massive state-level cybersecurity attack to date, and most governments and enterprises will be caught flat-footed. However, it’s not all doom-and-gloom; these attacks will force organizations to become more proactive about how they approach security, making it less about the process and more about the practice of safety.

Security Operations Providers (SOC) like AT&T, Circadian Risk, CyberHat, Dell, SecureWorks, DownRange Security Solutions (DRSS), Microsoft, and Orator have compelling proactive solutions for monitoring and managing cyber risk—all will be worth watching in the coming year.

Duh, data, data, data…

Data protection and privacy are the most pressing security challenges of our time. Consumers have been conditioned to turn over more and more personal information to companies for convenience—where we go, who our friends are, our religion, politics, employer, mood, etc. Not even the wealthiest man in the world, Jeff Bezos, is immune from breaches of privacy due to bad decisions and, well, indiscretion.

All kidding aside, the market for consumer data is a business and business is good. Most of us take for granted the amount of information we provide to service providers over our smartphones.Symantec estimates that over 90% of Android and nearly 40% of iOS applications collect and sell “risky permissions.” Risky permissions include location tracking, audio recording, call/text logging, and audio recording.

While we can’t fix stupid (i.e., what people do online, mobile or otherwise), several companies are making strong moves to help protect data. From an SMB and consumer level, Carbonite’s acquisition of Webroot demonstrates how important it is to address the gap between physical and cyber data protection, beyond just virus and malware protection. Conversely, Google recently announced it is all in on data protection by investing in an open source project it calls “confidential computing,” or Asylo (Greek for an aptly named “Safe Space”). On the surface, the attempt is notable. However, this is more like putting a Great White Shark in charge of Sea Lion conservation on San Francisco’s Pier 39. While intentions are good, Google and the industry’s history and hubris around privacy do not match reality.

I do anticipate more 2019 purchases of companies that bridge the gap for protecting enterprise and consumer data in the physical and online world. The blind trust will continue to occur, but rest assured some companies are taking on this fight. It is a fight worth having.

The killer robots are coming!

Well, maybe not robots—but chatbots designed to entice users to provide sensitive information, download malicious files, and misdirect users to nefarious sites are here. Chances are you are one of the >500 million people to have their personal information compromised through a hotel, retail, or even government attacks (I am one as well). Artificial intelligence/deep learning has become smarter and more interactive, making intelligent chatbots a viable solution to reduce customer and technical service costs. Today, hackers are leveraging AI-driven chatbots to “socially engineer” unwitting victims into making bad decisions. Over the next several years we will see bad actors creating more powerful and deceptive tools to penetrate both consumers and businesses. However, as killer chatbots become more conversational and intuitive, the industry will identify ways to counter what’s coming.

Much like IoT, AI is one of the most overused marketing terms in the industry today. There is significant, untapped opportunity, but it is important to be mindful of the risks and responsibilities associated with AI.

Over the next few months, I will be highlighting several trends, technologies, and the vendors that are leading the cyber charge. With the emergence of IIoT, the lines between physical and cybersecurity are increasingly blurred. Organizations find themselves having to combine human expertise with technology capabilities. The threats and criminals are smarter, and their methods are more sophisticated—we as an industry must strive to be better just to keep up.

This article was written by Chris Wilder from Moor Insights & Strategy and originally appeared on Forbes.com.

[/et_pb_text][et_pb_image _builder_version=”3.0.74″ animation_style=”slide” animation_direction=”left” animation_duration=”500ms” animation_intensity_slide=”10%”][/et_pb_image][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.0.74″ background_color=”#bcbcbc” custom_padding=”14px|0px|9px|0px”][et_pb_row make_fullwidth=”on” admin_label=”row” _builder_version=”3.0.65″ background_color=”#bcbcbc” background_size=”initial” background_position=”top_left” background_repeat=”repeat”][et_pb_column type=”4_4″ _builder_version=”3.0.47″][et_pb_cta title=”Take Back Your Day” button_url=”https://www.mdsny.com/contact” button_text=”Contact Us” _builder_version=”3.16″ header_font=”Droid Sans|on|||” header_text_color=”#141414″ header_font_size=”31px” body_font=”Droid Sans||||” body_text_color=”#000000″ body_font_size=”19px” use_background_color=”off” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_button=”on” button_text_color=”#000000″ background_layout=”light” button_bg_color_hover=”#008a93″ button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”#008a93″ button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”]

Learn how the latest technologies can free up your time so you can focus on your business

[/et_pb_cta][/et_pb_column][/et_pb_row][/et_pb_section]