2021: Cyber Security Predictions

February 25, 2021

However you look at it, 2020 has been one of the strangest years ever. Many of us were able to work from home for the first time, online shopping became the norm, and for long periods of time, video calling was the only way we could talk to our loved ones.


So what can we expect in this new year?


An increase in scammer activity

Security researchers have recently discovered a significant hacking that has affected most of the biggest companies in the US and beyond. A popular network monitoring tool used by these organisations was compromised by Russian hackers in May – but the compromise has only just been discovered.


For the past seven months, hackers have been stealing data completely undetected. The hacking is so sophisticated that many of the affected companies are not sure if they have lost data – or even if they have managed to lock the hackers out of their networks.


What does this mean for you? If the stolen data contains personal information (passwords, credit card numbers, email addresses etc), hackers may be able to carry out identity theft or fraud. You must be vigilant over the coming months for signs that you may be a victim.


It may be worth spending a few hours changing your passwords and setting up a password manager. If hackers have managed to steal your personal data, it will be unusable.


More attacks on your devices

As governments continue to struggle to contain Covid infections, many of us are likely to be working from home for some months yet. For hackers this offers even more opportunities to try and break into corporate computer networks; if they can take control of your devices, they have a backdoor into company systems – even when working from home.


You almost certainly use a VPN to secure your connection to company systems when working from home. Or maybe an unsecured remote desktop connection (RDC) to the computer on your desk in the office.


The VPN encrypts data as it moves between your office and your computer, making it impossible for hackers to intercept. But if they can break into your computer first, they can piggyback onto the network using your VPN connection – or steal your RDC logon details.


In 2021 it will become increasingly important to use a VPN for all your activities, not just work. Using a personal VPN helps to protect your privacy as you use the internet, and to help block suspicious websites and traffic, reducing the risk of your computer being taken over by hackers.


Installing endpoint protection will help to further protect your devices. Preventing hackers from installing viruses and trojans will stop them getting hold of your personal data – or breaking into your work.


2021 – the same but different

In terms of cyber security, 2021 will probably be much the same as 2020. Hackers will develop smart new ways to attack your devices, and we will find ways to counter them. And like every year, the best way to protect yourself is to be prepared and aware that someone, somewhere is always trying to steal your data.


Want to get one step ahead of the attacker this year? Take a look at our Protection Plans or get in touch with us to find out more.

Follow Us

Be the first to know

You might also like

October 14, 2024
DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process. DevOps is a popular practice, especially among large organizations. However, while it comes with numerous benefits, it presents numerous risks as well. One notable challenge is the increased velocity of deployment, which often complicates how developers implement and ensure application security throughout the development and deployment process. According to a recent survey, almost 80% of CIOs expressed concerns about the difficulty of discerning trusted elements from untrusted ones within DevOps environments. In particular, the pressure to deliver services at a faster pace sometimes prompts DevOps teams to take security shortcuts, resulting in potentially costly repercussions. These include data breaches, application downtime, and compliance violations.  So, how can you strike a balance between the demand for agile DevOps practices and the need to maintain robust security measures?
October 4, 2024
Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs. Applications fuel the engine of the world’s economy, but enterprises can encounter substantial hurdles when striving to retain a competitive advantage in a rapidly changing digital landscape. Businesses must continuously pursue inventive solutions, even as they contend with sophisticated adversaries looking to exploit opportunities to disrupt operations, compromise vital information, and inflict harm. According to recent research, approximately 17% of cyberattacks aim to exploit vulnerable web applications. Yet, 98% of web applications are susceptible to attacks that can lead to malware infection or redirect users to malicious websites. All the while, 72% of these vulnerabilities result from coding errors. Testing applications for security flaws during production is a vital process of the development lifecycle, and this is where Dynamic Application Security Testing (DAST) comes in. DAST is a security testing approach in application security (AppSec), in which testers assess an application in real-time, while it’s actively running. This process can be conducted even without testers knowing the application’s internal interactions or system-level designs.  This is because DAST tools operate without access to the application’s source code. Instead, they emulate genuine attacks, akin to those carried out by real hackers, to identify security weaknesses. This “black box” testing method examines the application from an external perspective, scrutinises its runtime behaviour, and observes how it reacts to simulated attacks. These simulations help evaluate whether the application exhibits vulnerabilities and if it is potentially susceptible to malicious attacks.
September 25, 2024
In this blog post we look back at the origin of the term “hacking”, as well as how activities that might be described as hacking have existed throughout history, even prior to the advent of computer systems – and what if anything these can teach us today. Hacking is attacking and breaking into computer systems illegally… isn’t it? The meaning of the term “hacking” has in fact changed substantially over time, morphing from describing essentially benign (or at worst mildly disruptive) activities into its modern attribution to largely criminal and illegal activities. What’s more, in its original usage, “hacking” doesn’t necessarily even need to involve computer systems at all.  In this blog post we look back at the origin of the term “hacking”, as well as how activities that might be described as hacking have existed throughout history, even prior to the advent of computer systems – and what if anything these can teach us today.
More Posts
Share by: