SlideShare a Scribd company logo
1 of 4
Download to read offline
INNOVATION NOW Presented by
5 Security Trends to Watch in 2020
From people to products, the cybersecurity industry is advancing at a rapid pace.
Pritom Das
GUEST WRITER
Founder/CEO of TravelerPlus
December 15, 2019 5 min read
Opinions expressed by Entrepreneur contributors are their own.
Presented by
Personal and corporate privacy continue eroding away as cyberattacks and data breaches become more common.
In the first half of 2019 alone, more than 4.1 billion data records were exposed in known data breaches. The
average cost of data breaches for affected companies is now nearly $4 million per business.
NEXT ARTICLE
Image credit: Andriy Onufriyenko | Getty Images
Standing guard while our society becomes ever more dependent on technology is the $120 billion cybersecurity
industry, which is expected to grow to $300-plus billion by 2024. With the coming ages of AI and IoT, we stand
to benefit from having an internet-connected home, vehicle or daily schedule in order to further automate and
organize our lives. But we have to ask ourselves: What are the potential hidden costs of becoming more
connected? With a hacking attack occurring every 39 seconds, it’s imperative that companies have the necessary
security measures in order to survive as a formidable business. With the end of 2019 quickly approaching, here
are five of the top security trends to look out for in 2020.
Related: 3 Cybersecurity Tips for Entrepreneurs
Expansion of Cloud-Based Security
As the world moves a lot of technology infrastructure into the cloud, we’re seeing cloud-based
security platforms and services follow. Cloud computing has evolved greatly over the last two decades, and now
is frequently used to support critical operations of everyday businesses. From cloud-based data-storage
services like Dropbox to all-in-one CRM clouds such as Salesforce, consumers and businesses have grown
dependent on storing sensitive data in cloud environments.
And the numbers speak for themselves. By the end of this year, cloud-security platform sales, a small sliver of
cybersecurity, is expected to become a $460 million industry. Cloud-based security provides several advantages
to traditional security approaches, including economies of scale, reduced costs, improved protection
performance, greater threat intelligence and quicker compliance with government and industry standards.
According to Kaspersky Lab, around 75 percent of companies are expected to move applications to the cloud in
the next few years. We can expect cloud-based cyber security to continue thriving well into 2020.
Advancements in Data Encryption
Since cyber attacks have gotten more sophisticated over recent years, a growing number of data-
encryption advancements have followed suit. A recent study carried out by the Ponemon Institute revealed that
45 percent of surveyed companies have an encryption strategy that is applied consistently across their enterprise.
But when a particular encryption technology or strategy becomes outdated and vulnerable to cyber attacks, all
data can be compromised.
We’re seeing many encryption advancements to help stay ahead of security threats. These include leading
privacy technologies, ring signature and zero-knowledge proof and distributed ledger technologies. When these
technologies are used in combination with one another, not only is full or partial data anonymization achievable,
but data and identity verification is also automated.
Shigeki Kakutani, CEO of QURAS, a next-generation privacy protocol, says that “as data is being democratized,
the premise for privacy protection is naturally important. Globally, we need to provide secure solutions that can
be used in both business and consumer situations, while always taking into account the level of privacy and
security needed across any industry or transaction.”
Cyber Insurance
With all of the cyber threats that our world faces, cyber insurance has quickly become a growing need for both
small-to-medium enterprises and large corporations. The aggregate global loss associated with cyber hacks and
extortion is estimated at $11.5 million for 2019, so it’s no surprise that companies are taking preventive
measures like buying insurance.
Currently, the size of the cyber-insurance market is estimated to stand at $2.4 billion in premiums, according
to Stanford University’s Cyber Policy Center. This market is expected to double, or even triple, by the end of
2020, but the high cost of coverage and restrictive conditions on insurance policies may restrict some growth.
When estimates have pegged the digital economy at around $11 trillion as early at 2016, it’s clear that the
"new" digital economy is severely under-insured. Insurance providers have had a difficult time keeping up with
the changing landscape of cyber risk, including the onset of more connected devices and the expanding role that
IoT is to play in coming years. As data breaches continue to make headlines, you can be certain that cyber
insurance will be growing for years to come.
The Growth of “Passwordless” Authentication
Password privacy and protection is a major security issue plaguing us since the dawn of AOL. But just
recently, a new authentication method has sought to take the place of passwords. Passwordless authentication
tools can include hardware tokens or one-time password generators, biometric authentication and knowledge-
based authentication.
By 2022, Gartner research predicts that 90 percent of mid-size companies will implement a passwordless
authentication approach in more than half of use cases. Companies like GetID are helping other
businesses process KYC & AML checks for their customers using a secure and compliant biometric product.
Since passwords are one of the biggest attack points for hacking, it is easy to see why identification through any
other means is top of mind for many businesses.
Related: 5 Cybersecurity Tools Your Company Should Have
Need for Cybersecurity Talent
The World Economic Forum reported a shortage of people trained in cybersecurity in 2017, and that shortage
has only increased since. It’s been projected by Cybersecurity Ventures that there will be 3.5 million unfilled
cybersecurity jobs globally by 2021, up 350 percent from 2014. In the U.S. alone, the total cybersecurity
workforce consists of nearly 1 million people, and there are currently around 500,000 unfilled positions. With
the list of security-training companies and security certifications only growing, employment in this space is
almost certain if you are qualified. The time to secure your spot has arrived.

More Related Content

What's hot

[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
CODE BLUE
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Carlos Valderrama
 

What's hot (20)

Cloud Identity
Cloud IdentityCloud Identity
Cloud Identity
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
IT Security Trends 2013
IT Security Trends 2013IT Security Trends 2013
IT Security Trends 2013
 
As telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwcAs telcos go digital, cybersecurity risks intensify by pwc
As telcos go digital, cybersecurity risks intensify by pwc
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
Security economics
Security economicsSecurity economics
Security economics
 
What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020What are top 7 cyber security trends for 2020
What are top 7 cyber security trends for 2020
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
How the Internet of Things Leads to Better, Faster Crisis Communication
 How the Internet of Things Leads to Better, Faster Crisis Communication How the Internet of Things Leads to Better, Faster Crisis Communication
How the Internet of Things Leads to Better, Faster Crisis Communication
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus Pandemic
 
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 

Similar to 5 Security Trends to Watch in 2020

5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
superintendingengine17
 

Similar to 5 Security Trends to Watch in 2020 (20)

Cybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You ThinkCybersecurity in the Cloud: Safer Than You Think
Cybersecurity in the Cloud: Safer Than You Think
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
IE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReportIE_ERS_CyberAnalysisReport
IE_ERS_CyberAnalysisReport
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Aon Cyber Newsletter v10
Aon Cyber Newsletter v10Aon Cyber Newsletter v10
Aon Cyber Newsletter v10
 

More from Dharmendra Rama

More from Dharmendra Rama (20)

The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Adding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool BeltAdding Incident Response Containers To The Cyber Security Tool Belt
Adding Incident Response Containers To The Cyber Security Tool Belt
 
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEWCORSAIR VENGEANCE A4100 GAMING PC REVIEW
CORSAIR VENGEANCE A4100 GAMING PC REVIEW
 
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMESMINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
MINI “GAMING PC” NAILS THE LOOK, STREAMS THE GAMES
 
How to build a gaming PC — and why you should
How to build a gaming PC — and why you shouldHow to build a gaming PC — and why you should
How to build a gaming PC — and why you should
 
How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200How to Build a Gaming PC for Under $1200
How to Build a Gaming PC for Under $1200
 
Cyber attack hits Lion
Cyber attack hits LionCyber attack hits Lion
Cyber attack hits Lion
 
How I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledgeHow I accidentally built a tech startup — without any technological knowledge
How I accidentally built a tech startup — without any technological knowledge
 
Computer engineering: A deeper perspective
Computer engineering: A deeper perspectiveComputer engineering: A deeper perspective
Computer engineering: A deeper perspective
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairsWith pandemic-era acquisitions,big tech is back in the anti trust crosshairs
With pandemic-era acquisitions,big tech is back in the anti trust crosshairs
 
Apple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concernsApple, Google rework coronavirus tracking tech to address privacy concerns
Apple, Google rework coronavirus tracking tech to address privacy concerns
 
Big Tech, Privacy, and Power
Big Tech, Privacy, and Power Big Tech, Privacy, and Power
Big Tech, Privacy, and Power
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...21 tech gadgets we use to boost our productivity and comfort when we work fro...
21 tech gadgets we use to boost our productivity and comfort when we work fro...
 
Android for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphoneAndroid for beginners: Tips and tricks for your new smartphone
Android for beginners: Tips and tricks for your new smartphone
 
13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity13 Smart Ways To Measure Your Tech Team's Productivity
13 Smart Ways To Measure Your Tech Team's Productivity
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic parts
 
Dharmendra Rama
Dharmendra RamaDharmendra Rama
Dharmendra Rama
 
Computer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic partsComputer Engineering 101: Stripping computers to their two most basic parts
Computer Engineering 101: Stripping computers to their two most basic parts
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

5 Security Trends to Watch in 2020

  • 1. INNOVATION NOW Presented by 5 Security Trends to Watch in 2020 From people to products, the cybersecurity industry is advancing at a rapid pace. Pritom Das GUEST WRITER Founder/CEO of TravelerPlus December 15, 2019 5 min read Opinions expressed by Entrepreneur contributors are their own. Presented by Personal and corporate privacy continue eroding away as cyberattacks and data breaches become more common. In the first half of 2019 alone, more than 4.1 billion data records were exposed in known data breaches. The average cost of data breaches for affected companies is now nearly $4 million per business. NEXT ARTICLE Image credit: Andriy Onufriyenko | Getty Images
  • 2. Standing guard while our society becomes ever more dependent on technology is the $120 billion cybersecurity industry, which is expected to grow to $300-plus billion by 2024. With the coming ages of AI and IoT, we stand to benefit from having an internet-connected home, vehicle or daily schedule in order to further automate and organize our lives. But we have to ask ourselves: What are the potential hidden costs of becoming more connected? With a hacking attack occurring every 39 seconds, it’s imperative that companies have the necessary security measures in order to survive as a formidable business. With the end of 2019 quickly approaching, here are five of the top security trends to look out for in 2020. Related: 3 Cybersecurity Tips for Entrepreneurs Expansion of Cloud-Based Security As the world moves a lot of technology infrastructure into the cloud, we’re seeing cloud-based security platforms and services follow. Cloud computing has evolved greatly over the last two decades, and now is frequently used to support critical operations of everyday businesses. From cloud-based data-storage services like Dropbox to all-in-one CRM clouds such as Salesforce, consumers and businesses have grown dependent on storing sensitive data in cloud environments. And the numbers speak for themselves. By the end of this year, cloud-security platform sales, a small sliver of cybersecurity, is expected to become a $460 million industry. Cloud-based security provides several advantages to traditional security approaches, including economies of scale, reduced costs, improved protection performance, greater threat intelligence and quicker compliance with government and industry standards. According to Kaspersky Lab, around 75 percent of companies are expected to move applications to the cloud in the next few years. We can expect cloud-based cyber security to continue thriving well into 2020. Advancements in Data Encryption Since cyber attacks have gotten more sophisticated over recent years, a growing number of data- encryption advancements have followed suit. A recent study carried out by the Ponemon Institute revealed that 45 percent of surveyed companies have an encryption strategy that is applied consistently across their enterprise. But when a particular encryption technology or strategy becomes outdated and vulnerable to cyber attacks, all data can be compromised. We’re seeing many encryption advancements to help stay ahead of security threats. These include leading privacy technologies, ring signature and zero-knowledge proof and distributed ledger technologies. When these technologies are used in combination with one another, not only is full or partial data anonymization achievable, but data and identity verification is also automated.
  • 3. Shigeki Kakutani, CEO of QURAS, a next-generation privacy protocol, says that “as data is being democratized, the premise for privacy protection is naturally important. Globally, we need to provide secure solutions that can be used in both business and consumer situations, while always taking into account the level of privacy and security needed across any industry or transaction.” Cyber Insurance With all of the cyber threats that our world faces, cyber insurance has quickly become a growing need for both small-to-medium enterprises and large corporations. The aggregate global loss associated with cyber hacks and extortion is estimated at $11.5 million for 2019, so it’s no surprise that companies are taking preventive measures like buying insurance. Currently, the size of the cyber-insurance market is estimated to stand at $2.4 billion in premiums, according to Stanford University’s Cyber Policy Center. This market is expected to double, or even triple, by the end of 2020, but the high cost of coverage and restrictive conditions on insurance policies may restrict some growth. When estimates have pegged the digital economy at around $11 trillion as early at 2016, it’s clear that the "new" digital economy is severely under-insured. Insurance providers have had a difficult time keeping up with the changing landscape of cyber risk, including the onset of more connected devices and the expanding role that IoT is to play in coming years. As data breaches continue to make headlines, you can be certain that cyber insurance will be growing for years to come. The Growth of “Passwordless” Authentication Password privacy and protection is a major security issue plaguing us since the dawn of AOL. But just recently, a new authentication method has sought to take the place of passwords. Passwordless authentication
  • 4. tools can include hardware tokens or one-time password generators, biometric authentication and knowledge- based authentication. By 2022, Gartner research predicts that 90 percent of mid-size companies will implement a passwordless authentication approach in more than half of use cases. Companies like GetID are helping other businesses process KYC & AML checks for their customers using a secure and compliant biometric product. Since passwords are one of the biggest attack points for hacking, it is easy to see why identification through any other means is top of mind for many businesses. Related: 5 Cybersecurity Tools Your Company Should Have Need for Cybersecurity Talent The World Economic Forum reported a shortage of people trained in cybersecurity in 2017, and that shortage has only increased since. It’s been projected by Cybersecurity Ventures that there will be 3.5 million unfilled cybersecurity jobs globally by 2021, up 350 percent from 2014. In the U.S. alone, the total cybersecurity workforce consists of nearly 1 million people, and there are currently around 500,000 unfilled positions. With the list of security-training companies and security certifications only growing, employment in this space is almost certain if you are qualified. The time to secure your spot has arrived.