Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • The Changing State of Cybersecurity: 5 Data-Backed Predictions
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

The Changing State of Cybersecurity: 5 Data-Backed Predictions

4 years ago Tripwire Guest Authors
The Changing State of Cybersecurity: 5 Data-Backed Predictions

Cybersecurity is never static, and that’s especially true today. After widespread and frequent disruptions in the past few years, the cyber defense landscape is shifting. Favored attack vectors are changing, new threats are emerging, and organizations are rethinking their cybersecurity focus.

Staying safe in the next few years requires an understanding of these developments. With that in mind, here are five data-backed predictions for how the state of cybersecurity will change.

1. The Cybersecurity Talent Shortage Will Worsen

Cybersecurity professionals today face a pressing talent shortage that will only worsen over the next few years. As cybercrime risks rise, so will demand for these workers, but this workforce segment isn’t growing fast enough to keep up. While one study revealed that 700,000 people joined the industry in 2021, that same study indicates that the world still needs 2.7 million more.

This skills gap could exacerbate the lack of cybersecurity knowledge that already plagues businesses. In a recent survey, 67.6% of cybersecurity professionals said they often have to educate their companies on proper security practices. With ignorance being such a prominent challenge, businesses may be slow to realize they need to attract more security workers.

Cybersecurity can also be challenging to break into thanks to its high technical requirements and continually evolving landscape. As a result, the profession will likely grow slower than it needs to.

2. Ransomware Attacks Keep Growing

Ransomware is another growing concern across businesses and industries. These attacks have become one of the most prominent threats of the last few years, and they will likely keep growing in the future. This trend results from two others: growing vulnerability among targets and increasing profitability.

The shift to remote work, which will likely become a permanent fixture, makes ransomware more threatening. Employees at home on their own devices are more vulnerable to phishing attempts, which is how many ransomware attacks are initiated. As working from home continues to be the norm for many, threat actors will have more opportunities to deliver ransomware.

Financial incentives for ransomware are also growing. The average costs nearly tripled between 2019 and 2020 as data has become more valuable and companies have become less willing to lose it. As companies continue to collect more sensitive data, criminals will keep raising the price of their ransoms.

3. Cybercrime Against Property Rises

One less common type of cybercrime that will grow in the future is attacks against property. Internet of Things (IoT) connectivity is growing, bringing more devices online and expanding attack surfaces. Since many of these attack vectors are new, they also slip under the radar, making them enticing targets.

Cybercrimes against property could be destructive. For example, many new cars come with mobile Wi-Fi hotspots, making them potentially susceptible to attackers. A targeted vehicle could be far more dangerous than a data breach, even threatening the lives of drivers and nearby pedestrians if malicious actors succeed in gaining control.

IoT devices are already notoriously lacking in built-in security features. Security will likely be slow to catch up as IoT connectivity expands, driving a rise in cybercrime against property.

4. International Cybercrime Targets China and Russia

As home to many of the world’s most influential companies, the United States has remained a favorite target for cybercriminals. However, over the next few years, China and Russia will become more frequently targeted, as well. This trend could threaten international companies with the creation of cybercrime hubs in these countries.

Between 2006 and 2018, 108 cyber incidents with $1 million or more in losses stemmed from China—more than any other country. Russia came in second with 98 major cyber incidents. These nations are already hubs for cybercrime, a reality which could work against those countries as they strive to become larger players in the data and tech space.

China already suffers the highest malware infection rate globally, with Russia not far behind. These trends will grow as international cybercrime ramps up and threatens businesses with data centers or operations in these nations.

5. Supply Chain Cybersecurity Becomes a Focus

Another trend that has already emerged is a growing focus on supply chain cybersecurity. Global supply chains faced new strain when the COVID-19 pandemic disrupted operations, placing an even greater emphasis on online shopping. This made supply chains and retailers even more susceptible to cyberattacks, which was further enabled by growing adoption of IoT devices.

As a result, supply chain cyberattacks rose 42% in the first quarter of 2021 alone. High-profile events such as the SolarWinds attack have highlighted the importance of supply chain security along with some current shortcomings. As these trends continue, businesses will place new emphases on this area going forward.

Supply chains have much room for improvement, with 61% of surveyed organizations having limited visibility into their supply chain’s security. Given the risks and state of the industry, these concerns will likely remain a focus for years to come.

Cybersecurity Is Always Evolving

Cybersecurity will be a leading issue as long as the world relies on digital technologies. Its importance is unwavering, but trends are continually shifting, and security professionals must stay on top of these changes.

These five trends are not the only changes that could come to cybersecurity but are the most likely and significant. Organizations hoping to stay safe in the next few years should keep them in mind.


About the Author: Dylan Berger has several years of experience writing about cybercrime, cybersecurity, and similar topics. He’s passionate about fraud prevention and cybersecurity’s relationship with the supply chain. He’s a prolific blogger and regularly contributes to other tech, cybersecurity, and supply chain blogs across the web.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor and do not necessarily reflect those of Tripwire, Inc.

The post ” The Changing State of Cybersecurity: 5 Data-Backed Predictions” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: COVID-19, Encryption, High Severity, Malware, Medium Severity, Phishing, Ransomware, TripWire

Continue Reading

Previous Master Key for Hive Ransomware Retrieved Using a Flaw in its Encryption Algorithm
Next Email Security Trends Coming in 2022

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

19 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

21 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

22 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

24 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

1 day ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

1 day ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT