Blog Posts Business Management

Cyber Security Threat to Look For in 2020

Blog: NASSCOM Official Blog

Cyber Threats to Look For in 2020

With the advent of new technologies, the doors of complex cybersecurity challenges have opened. This advancement has provided cyber criminals with thousands of opportunities to exploit and damage an organisation’s cybersecurity infrastructure. The year 2019 had some worst data breaches. 2020 is going to be a challenging year for the businesses, organisations and governments as the advanced cyber attacks are expected to rise.

Let us have a look at some of the top cybersecurity threats to watch out for in 2020.

  1. Over the last decade, Internet-connected smart devices used in offices and homes have proliferated. Most of these devices do not have enough security features installed, which allows attackers to coerce the device and enter the network.
  2. All through 2019, ransomware kept standing out as truly newsworthy and will continue to be a prevalent threat in 2020. It is still the most reliable way for hackers to make money.
  3. Deepfake attacks have shown remarkable growth in the past few years. With the help of advanced analytics technology, Generative Adversarial Networks (GANs), the threat actors can now produce fake but incredibly realistic videos and images that are difficult for humans to identity. In 2020, Deepfake attacks are likely to be an insidious threat to the cyber security landscape.
  4. Since Microsoft has announced that the support and updates for Windows 7 will not be available after January 14 2020, the probability of cyber attacks are likely to increase in 2020.
  5. Recently, a major security flaw was observed in the Huawei MateBook systems running the company’s PCManager software. The software comprised an insecure driver that allowed underprivileged users to create processes with high-level privileges. Such loopholes let attackers to exploit the vulnerability and circumvent the device’s security by using asynchronous procedure calls to further interrupt system processes and run malicious code.
  6. Since 2016, web-skimming (or e-skimming) attacks have compromised thousands of e-commerce websites to collect customers payment card information. Over the time, the threat actors performing e-skimming attacks have also evolved and are ready to target small- and medium-sized businesses as well as government agencies.
  7. With the recently developed malicious rootkits, the hacktivists will now attempt to compromise the supply chain of legitimate software packages by deploying hard-to-detect malware. The level of associated risk is high as the implanted malware would be difficult to remove even after formatting the system.
  8. Threat actors are now exploring the innovations in technology to create a new wave of cyber attacks involving machine learning and artificial intelligence. They have developed a new AI-powered malware that has the potential to automate human skills and processes, and can significantly increase the scale of damage caused by malware attacks.
  9. The advent and global adoption of 5G infrastructure technology will bring a new wave of 5G compatible devices, which would demand more security. Accordingly, the companies will be required to reassess their security paradigms for providing a secure and reliable mobile platform.
  10. As an alternative to email, the hackers are now using interactive social media platforms like WhatsApp, Facebook, Instagram and LinkedIn to entice victims into immediate actions such as calling a deceitful contact number, visiting a malicious website or downloading files containing mobile malware. Such attacks are now becoming an emerging threat to the cyber space.

 

The post Cyber Security Threat to Look For in 2020 appeared first on NASSCOM Community |The Official Community of Indian IT Industry.

Leave a Comment

Get the BPI Web Feed

Using the HTML code below, you can display this Business Process Incubator page content with the current filter and sorting inside your web site for FREE.

Copy/Paste this code in your website html code:

<iframe src="https://www.businessprocessincubator.com/content/cyber-security-threat-to-look-for-in-2020/?feed=html" frameborder="0" scrolling="auto" width="100%" height="700">

Customizing your BPI Web Feed

You can click on the Get the BPI Web Feed link on any of our page to create the best possible feed for your site. Here are a few tips to customize your BPI Web Feed.

Customizing the Content Filter
On any page, you can add filter criteria using the MORE FILTERS interface:

Customizing the Content Filter

Customizing the Content Sorting
Clicking on the sorting options will also change the way your BPI Web Feed will be ordered on your site:

Get the BPI Web Feed

Some integration examples

BPMN.org

XPDL.org

×