❑ 导 读
“世界向未来数字化发展的程度越高,所带来的网络攻击风险也就越大。”
全文共计4940字,预计阅读时间9分钟
来源 | Readwrite.com(转载请注明来源)
作者 | Abeer Raza
译者 | 张青青
编辑 | 蒲蒲
2020年新冠病毒席卷全球,但这并非是危及人类安全的唯一威胁。2020年也j | G * J h z是某些先进技@ & 9 + G术改变世界的一年,这些先进的技术变革将会改变未来人类社会的生活方式和商业模式。如今,我们已经掌握了5G技术、物联网、人工智能、云科技B X : q I Z @ h U和机器学习。诸类科技将会帮助我们提高工作效率,节约K 0 1工作时间,降低生产成本,并创造新的商机,变成我们日常生活中必不可少的一部分。
尽管关于T q } 4 v G _ z技术的乐观论调可谓老生常谈,但长远来看,这并非完全正确,即——“世界向未来数字化发展的程度越高,所带来的网络攻击风险也就越大。”
现代技术将增加我们在线创建的数据量,保护这些数据资料,将Y . E 7 I会成为未来十年重中之重的主要任务,从系统安全到网络安全,企业将面临 z [ 2 u c M L b优化网络安全问题的挑战——能否成功地防止恶意网络攻击。
随着科技发展日新月异,网络安全的漏洞难以洞察,因此我们很难阻止恶意网络攻击,并且由于我们对网络攻击缺乏! } f F T充分地了解而导致计算机防护技术的发展变得E : w s C更加困难,这片灰色地带成为恶意1 + F Z攻L l T G p k |击者的绝佳目标。
因此,让我们回顾某些当下的技术、现代法规以及企业在网络安全方面可以采取哪些措施来应对网络安全威胁。
5G的到来及网络安全隐患
随着5G试运行和全面实行的到来,我们正进入通信和创新型消费者服务的新阶段。由于5G的运行需要公司和其人员切换到全软件网络,因此持续运作更新的网络闭环可能会导致网络安全隐患。
这些频繁的更新类似于智能手机软件的更新,但是关于5G网络的更新可能会引发安全风险。由于发送和接收信息的5G连接设备数量增加,且远程访问变得更加普遍,因此早期5G使用者必须应对5G技术所带来的安全风险。但跟5G使用者比起来,网络安全专家更应当未雨绸缪。! Y W u N R ? ?
随着用户和使用率的提高,5G& ~ E S # q Y l宽带的扩展将会为研究网络安全漏洞的专+ + U E # ] 7 f家提供发展机会。随着5G全面覆盖企业和城市,网络R _ W攻击的覆盖面将变得加宽泛,这将使政府和私营企业必须Q f * 2 e ( H {大力推广和革新其安全工具和策略,以保护其设备、网络和应用程序免受恶意攻击。
由于网络安全基础设施的缺乏,早期的使用者可能会面临5G网络的授权和识别问题。访5 p d U ;问系统可能会对数据和安全性造成严重的威胁,也许这些早期的5G用户L ` M X = V N可能会对5G网络访问表现出极大的不信任和f M { x 6 { 7排斥。
网络钓鱼并没有结束
尽管数字领域技术飞速发展,但网络安全专家还是不得不应对网络o ! { w W [钓鱼攻击。这些攻击的目标通常是渗2 P S L透网络或感染网络本身的用户。
即使B 3 V } } 6 3 v Z网络钓鱼已经成为屡见不鲜的网络攻击手段,但黑客和恶意攻_ b W w 9 T E击者变得越来越聪明(这也得益于科技发展),他们的攻击手段也变得越来越狡诈。因此,m I ^ 0 X u ^ 7 ~就像2019年一样,反钓鱼的安全措施同样在2020年也是有必要得到重视。
黑客们自然也心知肚明,由于无法完全禁用所有电子邮件,因此人们很难消除诸如K e v 1 ] 0 0 2电子邮件欺诈之类的漏洞。与其他现代黑客(例如,利用零日漏洞)相反,网络钓鱼是一种进入网络内部的简便方法。
如今,公司必须时刻警惕这些钓鱼邮件,因为他们一旦失误点击就可以为入侵者打开后门,让黑客随意进入网络内部,从而控制和破坏公司网络。
大多数专家面临的问题是,没有一个解决方案可以阻止钓鱼攻击的成功。最后,这些攻击被归结为盲目点击、人为错误和缺乏专业性知识。
在未经确认 ` 9 S P K k G的情况下阻止下载,在直接打开任何链接之前对邮件进行预判,以及使用反恶意软件和反间谍软件来屏蔽和监控潜在的恶意活动,这些都能帮助你减轻危害,却不一定能完全阻止危害。
基于人工智能和机器学习的漏洞不容小觑
随着机器学习和人工智能市场的发展,在不同的业@ L - ? : ? [ B $务操作、系统和基础设施中的应用将会成为亟待解决的挑= Q @ U i 6 : 0战问题。这些资源密集型技术需要付出巨大努力来保护它们免受潜在攻击的攻击。
人工智能和基于机器学习的设备和软件必须在数据的帮助下进行培训,专家必须密切关注正在使用的数据类型。虚假数据破坏了机器学习的算法,同时,这种数据的“注入”也会阻碍“训练”过程。
这会导致算法看似运行稳定,但却会产生差强人意的结果,H $ d e 7 # g在分析产品和应( w ~ Z 8 2用程序的情. q T B q [况下,这可能会让企业损失数百万美元。
专家监测和分析指出,未来,数据对于人工智能和机器学习技术至关重要,因为所使用的数据集也是必须解决的安全漏洞。
在当今的形势下,由于人工智能{ @ { d Y w 0和机器学习是在封_ a x J闭的环境中运行的,所以数据漏洞问题并不会经常出现。但是一旦在商业领域中开始扩展某些数据程序,那就一定会出现漏洞。
当类似威胁分析和数据审查实0 j = Q 8 m现自p q e 1 4 F动化时,黑客就可以利_ b U W ` X | - q用这些程序误导公司,从而产生错误的算法,且不会暴露出任何蜘丝马迹。此外,该技术本身可以用于发现新的漏洞、研发; w H G _突破性的安全措施,并通过用于保护网络的相同算法渗透到系统中。
《加州消费者隐私法》现已生效
《加州消费者隐私法》可以被视作加州的《通用数据保护条例》。它从2020年= B F A Z K _1月1日开始实施,E U Q E w 4 Q ?使商业世界e _ k _走向一个新的方向,E / T U推出了更多的问责措施,重新建立起消费[ R 4 ( 2 J Y者和企业之间失去的信任。在这些案件中,公司和客户之间的关系过去和现在仍然依赖于共享个人信息,用以获得更好、更有针对性的服务,但议员们却认为这种做法被滥用了。
该法案明确了涉及到企业从用户那里收集到的个人信息的访问、删除和共享U b . { @ & h s [的消费者权利。如果你的业务是收集用户信息,根据加州消2 + u [ 6费者隐私法,你需要提供一个合法理由,为什么你要收集这些信息,这些信息是什么,你将如何使用这个信息,如果用户选择拒绝提供这些个人信息,那企业需要指导用户完S T r成通过数据库删除这些信息。
在华为5G技术被指控可能会对信息安全造成威胁后,人们对网络安全和数据保护; # & * ( E h $问题的担忧登上热搜,这导致了U c a 9 4 a e D美国政府禁止所有美国企业与中7 E N L ]国科技巨头进行商业合作。
当今世界,越来越多的人要求更为严格的监0 x j C U管,要求服务商确保客户的数据安然无恙_ u O,并保证$ l #最大程度的数据保护,这成为科技公司的重中之重。
《加州消费者隐私法》强制企业执行一项程序,要求企业获得父母或监护人以及未成年人(如果他们的年龄在13到16岁之间)的同意,以收集和共享他们的数据。
附加条款:“拒绝出售个人信息权”,此条款规定,商业网I b Y l W站须在其主页设置网页告示,从而告如若网站业务有泄漏个人隐私数据的风险时,消费者有u X t合法的权利拒绝其j t u Z ` 5 k网t 4 4 Y q ~站提供的业务。
企业和公司被要求用新要求的信息更新各自的隐私政策,包括但不6 ) X限于对加州居民权利的描述。
然而这些更为直截了当的法律,是为确保隐私保护和数据保护而制定的,但加州消费者隐私法采取的另一项措施是,要求企业避免向那些在12个月内选择退出该选项的居民发出申请。
这里使用的术语是“避免”。确实给企业留下* d = I了灰色地带,考虑到商业活动主@ a 2 J u d u N N要围绕数据收集进行,如果没有这些数据,公司就o M Y [ # n n (无法推广具体的交易或投放广告,而12个月的强制性等待期可能不利于企业的运作。
从欧盟对反垄断Adsense广告的15亿欧元罚款就可以看出《通用数据保护条例》的影响力,这一判罚于2019年生效,并使欧盟反垄断法案的总金) ^ g 8 i a i g额达到82亿欧元。《通用数据保护条例》希望企业合理合法地使用用户数据,而且如果企业违反该法例将会对其进行严重的财务n 6 f I 8 Y s f ~处罚,从而强制确保企业对数据采取强而有力地保护、监管和使用措施。
《加州消费者V u B Y C l保护法》与其相似,并* U ) v ? ^ u从2020年年初开始生效,它有望通过采取最有效的安全措施,使加州企业遵守保护消费者的规定。
对[ L x $ a T P =于总部位于加州的企业来说,向加州消费者隐私法合规过S / ?渡至关重要1 - r,而且5 N g / V X f S必须尽快完成,以限制可能出现的罚款。对于非加州的企业来说,计划并实施这一改变也很关键。即使联邦政府不采纳加州消费者隐私法,向纽约这样f ) J Y t + y C /的其他州也极有可能采用他们自己的“加州消费者隐私法”。
聘请安全} R h 8 y专家,关注合规性m Y I u a、投入资源以确保成功过渡到后CCPA时代,是2020企业应该关注的事情。
微软与Linux—云主导未来
Windows的未来似乎正在转向基于云的平台,云个人电脑的工作原理与其他基# ) + B ; y i ) M于云的平台和服务类似。最有可能的是,用户将不得不支付订阅,以获得q N q访问PC端上预先设置的应用程序包。
有趣的是,微软采用了Linux系统,并逐步向基于Linux的操作系统进行过渡。
听起来令人困惑,对吧?如果你打算在短期内继续使用微软的任何资源,你O C B E 9就需要掌握它。
未来,W1 / ) C D zindows可h ( V : E X能会在前端保持不变,基于云的G & k wPC会提供一个类似于我们已经习惯的Windows操作系统的用户界面,但在后端,微软可能会部署一个完整的linux设置。
由于大多数虚拟机现b # f o c K在都在Linux迭代运行,完整的Linux部署也在进行之中,目前40%的微软云操作系统也运行在Linux上。
在后台使用有几个重要的好处,特别是对企业而言。比如:
用户更换新的PC后,更新补丁将比之前更容易。此项维修旨在升级和更新硬件,并且硬件的发布较为直接化。
对于企业来说,Linux将是一个更放[ Y E P ? w (心的安全平台,对于存储敏: q y g感数据,Linux更加固若金汤,由于只有管理员具有根访问权限,所以这有助于控制系统漏洞。
该服务更有可能采用更加强大的安全系统,4 8 A }比目前硬件使用用户的系统更加安全,这意味着你将获得企业级的安全防6 c V B v C护,这也会帮助你对抗日益增长的网络袭击的威胁。
对于企业U G # u ? 6 -而言,投资强大的安全信息基础设施是非常有必要的,而在Tekrevol,我们也在尝试类似的安全基础设施研发。
从安全的角度来看,Linux是未来十年操作系统的关键,如果操作系统的可适用性对您d S . # X Q K个人网络系统的使用具有较为重要8 m o C l T n M ~的影响,那么您确实需要了解Linux具体是如何确V O X b : =保你网络系统的安全性。
网络安全趋势如何影响商业部署?
根据埃森哲的研究表明,68%的t n y商业高管认为他们的企业遭受网络攻击的风险增加了。到2020年,商界精英和企业~ y / f { l家的首要任务将是应对这些麻烦事。
解决这个问题需要领导者获得更多的知识储备、技能和工具来改进 P @ ( & p { m V他们组织的安全协议。协议包括网络保护和数据保护,以防止潜在性的的网络入侵。
我们预料到B { 4 6 L `对于网络安全专家,机器在线设计安全专家和系统安全专家的需求将会增加。一般而言,对跨技术的安全专家的需求也会增加。
企业必须为物联网,5G和基于人工智能的产品等技术将引入新的风险评估模型。
据高德纳分析,网络安全风险是首席审计执行官最关心的业务之V . X b y t / L `一。
到2020年,企业将到达一个临界点,要么开发出低于网络脆弱性风险的战略和技术,要么落= ] l 4 B Y ;后,但这将损害他们在各自市场上的业绩。
同样,我们可以预知到,为了解决这种日益增长的# p h威胁,大公司收购数字安全初创公司的交u e z i ]易将创下历史新高。
到2020年,如何遵守政府法规并建立严格的现代技术安全协议将是决定企业成功的关键。因此,如果你是一个希望扩大规模的企业家,你业务Y m = f a j的核心部c N . v V K ^ s I分必须转移到建立强壮的安全基础设施。
编后按
数字化未来是毋庸置疑的,但仅仅关注潜在便益并不能解决问题。对于企业来说; x b * I N % ),重要的是意识到自己对消费者的责任,并采取必要的措施来确保数据安b c k全和其他网络渠道的安全。
同样重要的是,它们必须高度关注自身平台、服务和产品的安全性,以保证采用: m [ @ J z ~现代技术能够带来良好的成效。我们所谈论的技术具有巨大的潜力,但是E ^ 7 6 A [向科技世界发展的过程中需要9 E 8 F r o ~ ?我们做足充分准备,确保信息安全+ G c k。
当今的企业必须投入更多资金来优化网络安全工作,创k @ z新网络安防战略,v h - ] k ~投用新的网络基础架构,利用现代工具来确保他们处于领先地位,并准备好应对任何可能出现的网络威胁。
原文如下
The year 2020 is overcome withH D - [ the5 9 @ s / I COVID-19. But the virus isn’t the only threat to our securityw 7 H. 2020 is also set to revolutionize the wor z P E m $ s 9 ?rld with advancements that will shape the future of lives and businesses, alike. We now have 5G and IoT to Artificial Intelligence, ClouY j 0 v 0 o #d technology, and Machine Learning. These technologies will become an ine 1 E y N M tegral part of our dai3 1 -ly lives in creating efficiency, saving time, reducing costs, and unlocking new opportunities.
Though this optimistic language is something you hear quite often (and it’s nw : 5 ; J _ v 4ot untrue to a large degree), the more the world trat t j s _ 9 Qnx m n G 1 : 1 A %sforms towards a digital future, the higher the@ % R rise in threats of CyberattZ ( ^ 4 R ^acks.
Modern technology is set9 . s W t , to increase the amount of data we create online, and protecting thih 8 U ! ! U a ls dataL } v x will be one of the defining arcs of this decade. From system security to netwo o - Q ; m ~ork security, busineR F + :sses will face challenges in optimizing their cybersecurity to prevent malicious attacks from being successful.
It is hard to prevent malicious aS M _ p H +tQ b +tz C F ( $ 8 packss ] a / l , U k because these tech4 o W w o bnologies are new, vu% x ~ %lnerabili2 J _ a oties are les[ + ? v _ Fs known, scaln m _ e m `ability harder due to a lack of familiarity, thereby making all of these ambiguities an excellent target for bad a| 6 R @ ctors to exploit.
So let’s take a look at some of these technologies, modern regulations in place, and what business] * $ = z $ [ # }es can do to combat this threat with regards to their cybersecurity.
The Advent of 5G and It’s Cybersecurity Vulnerabilities
As 5G trials and roll-outs happen, we are enterinx K G T - {g a new era of communication and innovative consumer services. As the adoption of 5G will require companies and people to switch to all-software networks, the cycle of constant updates might result in se4 g m r 5curity vulnerabilities.
These frequent updates ark ( j ` _ we similar to the updates of smartphone software, but those about 5G n{ _ E ! # Ketworks ca0 a R S Hn lead to security risks. Risks are something thatU O Q m H $ { 3 early adoM g 5 N I J j Epters will have to deal with since the numE m t G , 1ber of 5G connected devices that send and rH X R t t z r F leceive information increases and remote access becomes much more commonplace, cybersecurity expeh ^ D v v Urts will have a huge challenge in front of them.
With increased users and use, expanding the baS * 6 8ndwidth for 5G will present opportunitie[ k P G m % cs for experts looking tY 0 - z O 4 d Mo exploit these vulnerabilities. As enterprises and cities becoq ^ [ @ 1 hme 5G pow) k v yered, the attack surface will become much larger, putting t c khe burden on gT ] G `overnments and private enterprises to pump up and revolutionize their security tools and strategies m E }s to safeguard their devices, networks, and applications against malicious attackers.
One prM ^ F y + = @ !oblem that ear% Q 1 R Tly adopters might face due to a lack of security infrastructur1 G @ p q t 9 9 3e could be the authorization and ideD + Z v - 6 Lntif, / [ ~ s * / bication of a 5G network. Access to the system can allow a significant threat to data and security, and perhaps these early users might adopt a stringent no-trust policy with regards to 5G ` j a W R ~ x netwW B - Y Qork access.
Dona P 0 ; 4 ; K i )’t Thinb e 5 2 ; yk Phishing Is Over
Though technology is evolving rapidly in the d( x L k % ( # F +igital landscape, cybersecurity experts will have to deal with phishing attacks.( { X 9 _ X TheS { Q J Y Ase attacks are often targeted to penetrate a network or infect theD r % : g J = 5 V users of the network itself.
Though) H @ t z Y z ) G phishing is a generally well-known attack, hackers and malicious actors are becoming smarter (thanks to technological evolution), a/ i f : 2 . knd their attacks are becoming more and more sophisticated. So like 2019, seco ; , Z 3 8 Qurity[ B Z N measures against Phishing will also be necessary for 2020 as well.
Exploits such as email phishing are hard to eliminate as a problem since you can’t really disable~ C R o A V & = emails altogether, and hackers know that. Phishing is also an easier wa{ C b 3 h Xy to get inside a network as opposed to other modern hacks, such as exploiting a zero-day vulnerability.
Companiesf L } ) : ~ today have to an w 4 Z w V P |lways beware of these phishing emails since they only take one wron- e Y E 7 Z [ ng click by som U M a f ? ] V }meone with access to admin credentials on a network to open a b4 o rackdoor thatD j ; } s 2 allows malicious actors to gu : H _ + 7 1et iY V N R l N 8 Y sn, take control, aA W J A ] F - ;nd corrupt the company’s network.
The probK C v 0 * ~lem t@ W Zhat most experts face isg 3 | s J G 5 6 L that there i. u 5 * r , 8 & Ds no one solution to stop phishing attacks from succeeding. At the end of the day, these attacks can boil down to a recA m /kless click, humx - u ] @ 7 pan error, and lack of knowledge.
Blockie W :ng downloads withoutR u ^ M confirmation, assessing5 b 0 H $ the email before o3 a & 3 g n . kpening any links directly, and usa ] t N U ] 7 _ ling anti-malware and anti-spyware softwaM 8 U b W / 6 Bre to block or monitor potential malicious activities could help you mitigate the harm but not necf e p } 5essarily prevent it entirely.
A. I. and ML BaseW ; vd Cyberse[ N Hcurity Vulnerabilities Can’t be Ignored
As the MachE $ 3ine Learning and Artificial Intelligence market grow, theb o 5 r - 9ir application in different business operations~ [ y, systems, and infrastructure will be a challen2 G A uge to overcome. These technologies are incredibly resource-intensive and will require significant efforts to make them secure against potential attacks.
AI and ML-based devices and software have to be trained wi6 3 H / N } U Nth the help of data, and experts will have to keep a keen eye on the kind of data that is bei* P , $ng used. Data duping to corrupt tU - g K uhe le@ w } X _ S N darning process of the MH - 6 V n = )achine LearX k }ning algorithm can be injected to hamper th- - N V 4 F fe training process.
This canu { 8 @ lead to the algorithm working seemingly fine but producing wrong results, w4 l Z : |hich could, in the case of analytical products and applications, cost businesses millions of dollars{ F 2.
How experts monitor and analyze the data will play a cp G lrucial part in the fv ; R P ! { H future of A.I and ML since the data set being used can be a security vulnerability that will haveo = o 0 E a D | to be dealt with7 9 0 a R . 8 k D.
In the current climate~ A } e # T ! C `, this is a less severeX 1 o ( ( P ^ ) issue due to A.I and ML operating i3 . Xn specialized environments, but once bus! i T Zinesses begin to scale these processes, there are bound to be vulnerabilities.
W8 C 0 p ; 5 Ghen processes such as threat analysis and data review become completely automated, malicious actors could exploit these processes to misguide companies and ma| j O v 2 = lnipulate results without any obv{ p / . r hiously apparent problems. Furthermore, the technology itself can be used to discover new vulnerabilities, brj h U j Neakthrough security measurE ` s h ! e nes, and to7 u Rols, and penetrate systems+ f t D b J b { through the same algoritk k |hm that is being used to protect networks.
California Consumer Protection Act(CCPA) Is NowU ^ z a F f In EfU I ? Jfect.
The California Consumer Privacy Act can be considered CaliD t B d V ufornia’s GDPR. It became active from January 1, 2020, pushing the world of business in a new direction, with more accountability measures being ensured to re-establish the lost trust between consumers and companies. A company to client relationships in these casesR R @ : i ] was and still is dependent oe L W F & An the sharing of personal i` 9 s l d Znformation for better anQ ] Y x B Fd more targeted services, something that lawmL 9 : r /akers think has been misused.
The bill established new consumer rights reh W * O #lating to th( e - b v B p _e access5 _ w q Y _, deletion, andf V S N k 8 sharing of personal information that businesses collect from their users. If your business is collecting user information, under CCPA, your business hasP e I j to provido T Ue a reas? )on as to w$ y . _ Y y * Ohy you’re collecting this information, what this informativ 8 ; O T I W r aon is# # n S = g Q g, how yop v r #u will use this in9 ) - . c B 5formation, and guide users through the process of deletij ~ J ( Rng that inforb L c } P E amation from your dQ S x d @ x _ , ^atabase, if they choose to do so.
The conc1 3 Y : T $ _erns with reK ( 0 0 / 4gards to cybeJ S N K )rsecurity and data protection became news after the claim of Huawei’s 5g technology being a possible threat of the securiJ 4 hty that resulted in the US government banning all US businesses from dealing with the Chinese tech giants.
In such a world, the burden on TechB e 2 q companies to ei & _ X _nsure maximum data protection came into a significant highlight, with more and moreo @ L M [ $ people pushing for stricter regulations and demanding accountabW j ` o X B +ility from service providers to ensure that the data of their customers arW p p q We in safe hands.
The CCPA enC s d 2forces bL 4 1 s K t FuK & fsinesses to implement a process that allows them to obtain the consent of a parent oo x R fr a guardian and the minorv ( a if they’re between the age of 13 and 16 to collect and share their data for the business’ purposes.
This comes with tK ( [ X f 7 L ahe additional “+ B o ZRight to Say No to Sale of Personal Information” which is to be provided through a web link on the homepage of a business’ websitez - { j w d w K 7 that redirects users to a page where they can opt-out their consent protecting their data and perW B ! o + R Fsonal information from being sold( ; / / by the business legally.
Businesses and Companies are requd 0 5 O 1 [ Q ]ired to update their respective privacy policies with the newly required information, in` / % 6cluding but not limited to the description of California) U { E D b residents’ rights.
While these are the more straightforward laws that are placed within the CCPA to ensure privacy protection and data protection, another measure the CCPA takes is to ask businesses to avoid sending opt-in reh @ 5 Squests to residents who have opted out of the option for a period of 12 months.
The used termk 8 - f 9 ;inology, which is “avoid” while does leave a gray area for businesses to use, it takes intW r Eo account that business actg ^ 0 b . : } !ivities mainly revolve around data gathering, in the absence of whh _ } X 7 + ^ Z @ich companies cannot promote specific deals orP u P F ( A s s show adE = 3 3s, for which a 1S { ` w r @ ] W :2 month mandatory waiting period could be dK z detrimental to the functioning of the business.
The power of GDPR ca6 6 [ 3 s D . ? ;n be seen through the European Union’s 1.5 Billion Euro fine for anti-trust AdSel 6 ]nse advertising. This fine, whi~ ~ B j Zch was levied in 2019, brought the ovk I :erall EU anti-trust bill to 8.2 Billion Euros. GDPR expects companies to use data responsibly and itsn N N [ ? breach weighs significant financ$ o v X o p * %ial damage to businesses, creating a force that ensures that companies adopt the best data protection, regulation, and use policies.
CCPA is+ 6 v 6 * W + p a similar force, being in effect from the beginning of the year. It expects businesses in Cali^ ( N 7 # x _ v :fornia to adopt the5 7 F Q w 3 7 best security practices and cc L ` j & ~ T }omply with the regulations set to protect consumers.
For businesses based in California, transitioning to CCPA compliance is cruc T Y :ial, and it has to be done as soon as~ x % w D = - T 4 possible, to limit the potential fines that might be coming their way. For businesses that are not California-[ B , N based, planning to make this change and implementing it is also crucial. It’s likely that other states such as New York will most likel2 v W 0 h # 4y adopt their own version of the CCPA, even ife T G , it is not adopted by the Federal government.
Hiring security specialists, fy F g s `ocusing on compliance, and devoting reZ I # - o 0soD 8 ]urces to ensure that there is a successful transition to a post-CCPA wv y n A 6 [orld is something that businesses in 2020 should be looking towards.
Microsoft and Linux – The future is Cloud# ^ G 3
The future oO Z e s Pf Windows seems to be sh- = * @ V ^ l } cifting towards a cloud-based platfR ( !orm. Cloud, ] b o , PCs will work similarly to how other cloud-based platforms and services work. Most likely, users will have to pay a subscription to gaih Y G f i p Nn ac4 w % 1cess to a pre-set app bundle to run on the PC.
What make! 9 |s Mic& 4 D S , 8 X o vr7 D m e 1 : 0 [osoft more interesting is their adopti r kon of Linux anc c ; U r S p 8 pd transitioning towards a Linux-based operating system.
Sounds co8 W 8 # U %nfusing, right? Well, you need to grasp hold of it if you5 L f are planning to continue using any resources from Microsoft sb 3 R F p n ] $ Mhortly.
ThV n 5 j [ K ne future of Windows might stay the same on the front-end, with cloud-based PCs providing a simil- 1 Q P ar UI to the Windows OS we’ve grown up accustomea m 7d to, but on the back-end, Microsoft might deploy a full-Linux s} ! Metup.
A fulltime Linux setup is happening because most VMs are now rX 0 Funning on Linux iteratioN ~ ] _ , Ins. Even Microsoft Azure has around 40% of its machines runn/ S y 3 e ing on Linux at the moment.
There are a few substantial benefits of using on the Back-end, especially for businesses. Here are the benefits:
Migration from an older PC to a new one, itT d . 9s updates, and patches will become easie+ O Z Q Pr than b) 4 2 f ~ - z 7efore. The service will upgrade the hardwv [ l ~ }are, take care of the updates and release them directly, and deal with migration.
For businesses, L| w : 2 [ ( ; V ?inux is a much better platformQ = p D = for security. Linux is a safer platform for storing sensitive data with only the admins having theJ d U W re ) { ooot access, helping keeping system vulnerabilities in check.
The service is more likely to adopt a more robust secuj G ; *rity system than you would on you& _ C ~ M - V - 9r own hardware, which means that you will gain access to enterprise-grade security, helpinx v %g you combat the rising threat of cyber-attacks.
For businesses,W j n it in ) F Cs imperative to start investing in robust security infrastructure, and at Tekrevol, we’r0 9 E ?e trying our hand with some as w9 x Z H ^ U , Q Vell.
FN v Prom a security standpoint, Linux is key to OS in the next decade. If you too have a wide range of OS applicability critical to your internal systems, you really need to know how Linux caH & Mn make your security more concrete.
How Will Cybersecurity Trends Impact BusinesN D - T A ! ss strategy?
According to one study by Accenture, 68% of business leaders think that there is an incrj n q =eased risk of a cyber-attack? j v Q a S Y N W on their business. The year 2020 will be one wherx o r % g & e tackling these threats will become a primary focus of business leaders and entI W D l ~repreneurs.
C[ + t , $ k _ombating this problem will require these leaders to acquire more knowledge, skills, and tools to improve their organizath q !ion’s security protocols. Protocols includes n3 O v oetwork protection and data protection against possible breaches.
We can expect an increased demand for network security specialists, ML design sO d @ecurity specialists, and system security experts. In general, the demand for security specialists acrossN L x technologies will also increase.
Businesses will have to incorporate new r6 * f a C o Yisk ass^ L 7 Bessment models for technologies such as IoT, 5G, and AI-basef J 1 Rd products.
According to Gartner’s press release, cybersecurity risk is one of theI | B k ; tR * b 7 F + B op concerns that chief audit executives have with regards to their businesses.r C m i
In 2020, businesses will come to a tipping point where they wilU Q Ol either develp | D g * Y $ @op strategies and technologies that help combat the risk of cyber vulneU Q F V ?rability, or the lack of evolution will hurt their perfo a j Y # L ! & Mormance in the market.
Similarb l I s W e ; !ly, one can foresee big corporations acquiring digitalT , u @ x P q security startups for record-high acquisitions to keep up with this rising threat.
H9 Y D I 1 }ow businesses achieve compliance with governmenK ! st regulations and establish strict security protocols with regards to modern tech will define their success in the year 2020. So, if you’re a business owner looking to scale, tr1 E I 0 F ( r : Nansferring your focusR w # 9 e j ( towards establO + T ?ishing a robust security infrastructure has to be a central part of your business strategy.
Wrapping Thind h 9gs Up:
The future i] W s 1 F $s digital, there is no denying it but simply focusing on the possible benefits isn’t going to cut it. For buK M Z sinesses, it is crucial to realize their responsibility towards consumers and take the necessary steps to ensure data protection and other cybersecuN h 0 o % . g B _rity avenues.
It is also vq | 8ital for them to focus strongly on the security of their own plaP 3 ? b )tforms, services, and prh V + f x ! coducts to ensure that the adoption of modernv T P B E : technology drives positive results.D p ` 3 p , i & The technologies we’ve talked about have great potential, but the journey into the world of technology requires avid preparation to ensur+ 4 N f P ye security and safQ f iety.
Businesses. 5 L H ` today have to invest more into optimizing their security, create new strategies, implement n! j 4ew infrastructure, and leverage modern tools to ensure that thM ? I @ U ` C f 2ey aY ^ U B % C |re ahead of the and ready to fight any cyber-threats that may come their way.