Kayla Matthews
Kayla Matthews

5 Cybersecurity Trends Defining 2019

5 Cybersecurity Trends

The cybersecurity industry continually evolves to meet changing needs and adopt new technologies. As such, it’s appropriate to take a look at annual trends. Here are five of them for 2019:

1. A Greater Reliance on Hackers for Hire

There’s a skills-shortage crisis in the cybersecurity industry, making it difficult for businesses to meet needs with full-time personnel. However, some hire freelance hackers who earn $1 million or more in total “bug bounties” for successfully exploiting vulnerabilities in systems or networks. When hackers do that, it becomes easier for companies to understand how to fix issues.

The U.S. government even takes this approach, and the Air Force reportedly leads the way in offering compensation to hackers that find problems. Earning a bug bounty typically requires hackers to show the vulnerability, as well as how to fix it.

2. Cybersecurity Taught in K-12 Education

Cybersecurity education programs are not new, but they’re typically for adult learners, such as people taking college programs. There’s a recent push to start teaching cybersecurity best practices earlier, such as in K-12 schools. Some advocates say introducing the subject in high school is too late, and that it’s best to do in elementary school.

By then, kids already understand the need to wash their hands to stop themselves or others from getting sick. Teachers could apply a similar analogy to cybersecurity and discuss how keeping digital devices “clean” helps those gadgets stay healthy.

Educators know that most of today’s learners grew up with technology and like using it. Now, they can be instrumental in helping them do it safely. If kids learn best practices from a young age, they could lead the way in helping the future stay safer from hackers that depend on people having weak passwords or falling for malware tricks.

3. Cloud Companies Getting SOC 2 Certifications

From 2014, companies that store data in the cloud had to get SOC 2 certifications. In 2019, cloud customers and providers alike are more familiar with this requirement and what it means. The SOC 2 is a type of technical audit that requires complaint companies to set and follow policies and procedures to keep information safe.

The SOC 2 verifies a company’s commitment to protecting customer data. It can also help them demonstrate to clients that the enterprise views strong security practices as a regular part of business. Some of the things covered under the umbrella of the certification, such as anomaly alerts and actionable forensics, help ensure that companies take proactive stances to prevent vulnerabilities.

Since the SOC 2 certification is about implementing all-encompassing policies that support security, it helps build customer trust. Businesses also benefit because compliance means focusing on data security in ways that facilitate longevity.

4. U.S. Lawmakers Getting Serious About Connected Device Security

One of the often-mentioned concerns about Internet of Things (IoT) gadgets is that manufacturers do not have to adhere to minimum security requirements when making these connected devices. The mindset is often something like “build and release the gadget now, fix security flaws later.” Device makers race to put their products on the market before competitors release similar products, and they don’t prioritize cybersecurity.

That may change soon, since U.S. members of Congress introduced The IoT Cybersecurity Improvement Act of 2019 in March. It would set standards for IoT brands providing devices to the U.S. government or contractors doing the same.

The act is an example that people at the national government level realize there’s no time to waste in building a framework for IoT manufacturers to adhere to. Other legislation could soon follow and drastically change the IoT landscape concerning security.

5. More Emphasis on Securing Voting Machines for Elections

The 2016 U.S. presidential election was ultimately a startling wakeup call that voting machines with insufficient security are threats to the nation. In the days leading up to and following the contest, cybersecurity analysts gave warnings about how voters in some districts used vastly outdated equipment for voting, and that hackers could change data in a matter of seconds.

The lack of a paper trail for voters highlights one of the pitfalls of moving forward with technology too quickly and doing away with traditional methods. This year, as people gear up for the 2020 elections and start choosing their favorite candidates, a discouraging number of voting machine flaws still exist.

The good news is that cybersecurity for voting machines is a topic that received mainstream awareness, and some experts want to do what they can to boost security. For example, the United States’ Defense Advanced Research Projects Agency (DARPA) is working on open-source technology for voting machines that could be virtually hacker-proof.

Once it finalizes the results of the endeavor, DARPA plans to release it freely to software experts around the world. Millions of computer experts could examine the software for weak points and give feedback to DARPA on potential improvements.

Up until recently, many people believed votes were accurately tallied, but that’s not always the case. This cybersecurity effort could change that.

An Action-Packed Year

2019 is nearly at its halfway point, and it has had several cybersecurity developments already. It’ll be fascinating to see what the rest of the year brings.

By Kayla Matthews

Kayla Matthews Contributor
Technology Writer

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website, Productivity Bytes.

follow me
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ in the human body. While ...
Sekhar Sarukkai

A Closer Look at Insider Threats and Sensitive Data in the Cloud

Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that  sensitive data in the cloud had reached ...
Chris Gervais

Why Containers Can’t Solve All Your Problems In The Cloud

Containers and the cloud Docker and other container services are appealing for a good reason - they are lightweight and flexible. For many organizations, they ...
As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

As Enterprises Execute Their Digital Strategies, New Multi-cloud Landscape Emerge

The Multi-cloud Landscape The digital universe is expanding rapidly, and cloud computing is building the foundation for almost infinite use cases and applications. Hence, it’s ...
Daren Glenister

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent of organizations store sensitive information ...
Facebook

Facebook admits to another data leak, saying that up to 100 developers accessed people’s data from Groups

More than a year after Facebook clamped down on how much personal data third parties could see, the company has found some app developers still had access to people's data ...
BBC Tech

Slow websites to be labelled by Chrome browser

Websites that load slowly because they are poorly coded could soon be flagged by Google's Chrome browser. Google said it was working on several "speed badging" systems that let visitors know ...
Samsung

Experts Discuss Taking AI to the Next Level at Samsung AI Forum 2019

Samsung AI Forum 2019 Samsung Electronics is committed to leading advancements in the field of artificial intelligence (AI), with the hopes of ushering in a brighter future. To discuss what the ...