Cybercriminals are getter smarter and slicker by the minute. With this in mind, IT security should take a precedent now more than ever. Let’s take a quick look at some cybersecurity trends and challenges for this year.

Phishing

Phishing attacks are now more targeted than ever. A study conducted at the end of 2018 revealed that online attacks were up 300% over the previous year. Poorly constructed and designed phishing emails are something of the past. Now hackers offer emails that are localized, geo-targeted, personalized and with authentic-looking URLs and email addresses. You as a CEO, CFO or CIO should look to investing in phishing stimulators and adopting comprehensive security awareness programmes.

Make the Most of GDPR

The EU’s GDPR is not a regulation that should be feared or ignored. If anything, the GDPR provides businesses with a rigorous set of guidelines for data protection and security. You should think of the GDPR as a journey to raise the bar of IT security in your firm and the protection of your data and that of your customers. In essence, GDPR provides you with a framework to make your data security practices more transparent, more organized, clearly documented and compliant.

Endpoint Security

Hackers are now able to manoeuvre through firewalls using the cloud, mobile devices and social media. IoT devices are the most vulnerable when it comes to endpoint security. To avoid zero-day malware – vulnerabilities for which there is no known fix – you will need to employ advanced EDR (Endpoint Detection and Response). Also, keep all endpoints, including those of IoT, continuously monitored for threat and up to date with the latest security patches.

User Education

No matter how stringent how IT security measures are, your users will always remain the weakest link in the chain. Clicking a link by mistakes, not backing up data or not following company data protection protocol can result in a massive and irreversible data loss.  Your employees should be offered ongoing training in cybersecurity awareness. You should also enforce a security code of conduct that prohibits logging into unsecured public networks, using workplace devices for personal use, downloading unapproved applications or sharing and emailing sensitive credentials.