The “new normal” is forcing companies to reconsider their existing plans, structures, and processes and to seek out new solutions, including in cybersecurity. The experts from TÜV SÜD Sec-IT are keeping companies and their IT security departments up to date with the important trends and developments to look out for next year.
“The new normal requires companies to implement a change process,” says Stefan Vollmer, chief technology officer (CTO) of TÜV SÜD Sec-IT. “Large parts of the workforce will continue to practice mobile working and working from home in the future. Use of remote access to business data and applications stored in the cloud will continue to rise. Access management solutions, the associated time and effort expended on data protection, and, of course, IT security for working from home must be aligned to this new normal.”
Against the backdrop of this development, the experts from TÜV SÜD Sec-IT expect the following cybersecurity trends in 2021:
Workforce gap—automation can help
Qualified IT security experts were at a premium even before the coronavirus pandemic hit. The (ISC)2 Cybersecurity Workforce Study from 2019 estimates the global workforce gap at 4 million. In view of these estimates, companies must increasingly seek out automated solutions to relieve the workload of their existing staff and ensure that resources are focused better on protecting against new threats and developing new strategies, while leaving minor tasks to be automatically completed by the system.
Improve supply chain security
Lockdowns and new regulations have forced suppliers in particular to explore new avenues and restructure existing processes. Circumstances are pressuring manufacturing industries into digitizing a growing number of sub-processes, or even entire processes. Smart connectivity and remote control of multiple devices via the Internet of Things (IoT) will evolve into an important factor in this context. To protect these IoT devices against cyberattacks, their design and development and their security need to be standardized so that they can be tested and certified against objective criteria.
Cloud security is increasingly vital
To simplify remote access and mobile working, many companies are moving their applications and services into the cloud. As a consequence, these platforms require higher levels of protection. One way of enhancing security in the cloud is to seek prior analysis and advice from third-party experts. However, subsequent regular and extensive penetration tests are imperative to check the cloud solution for potential vulnerabilities.
Automated phishing
Quantity over quality is still the watchword of cybercriminals. In keeping with this, the wide phishing net cast by cybercriminals using email and social media will continue to figure among the biggest threats to companies. Employees must be made aware of these risks and the scams used by fraudsters and learn how to handle these threats in dedicated security awareness training. A report published by Cofense in 2019 outlines the extent to which automation also makes good sense in defense of cyberattacks.
Data protection still crucial
As the degree of digitization grows, so too does the responsibility for protecting the collected and stored data, which presents a challenge for small and medium-sized enterprises. Therefore, companies need not only ensure the best possible protection for these data, but also be familiar with the key data-protection requirements laid down in the European Union’s (EU) General Data Protection Regulation (GDPR). In the case of larger companies, external advisory services or the outsourcing of responsibility to an external data protection officer (DPO) may be helpful.
Standards are the backbone of security
The “EU Cybersecurity Act” regulation came into effect in June 2019. It establishes the regulatory framework for the EU-wide security certification of products, services, and processes. According to this regulation, ICT products must comply with standardized security requirements from the earliest stages of design and development as well as in production (“security by design” and “security by default”). Uniform standards on this basis enable certification to be performed by an independent and impartial third party.
Good day. I was impressed with your article. Keep it up. You can also visit my site if you have time. Thank you and Bless you always.