November 15, 2020

What are the Top Trends for Cybersecurity Month 2020?

October is Cybersecurity Awareness Month. This year seems to have drastically changed the cybersecurity world now that many people are working remotely. IT teams are stretched thin to support remote needs, there are issues that arise with connectivity/bandwidth, and employees are using personal devices to access work files. Because CPA firms were forced to rapidly move to remote work, security may have taken a back seat to maintain operations.

As we celebrate Cybersecurity Awareness Month and head toward 2021, here are some cybersecurity trends Cetrom has noticed:

Trend 1 - The cybersecurity skills gap

The supply and demand for cybersecurity professionals is off balance. Based on a research study by ESG and ISSA, there are multiple factors which contribute to the skills gap. In the study, 68% of professionals interviewed felt their career paths weren’t well defined. Additionally, 52% of respondents felt hands-on experience was more important than certifications. However, joining the industry requires cybersecurity experience in the first place. Organizations have a role to play in this as well. Of respondents, 36% felt their organization could provide a bit more training while 29% felt their organization could provide significantly more training. And finally, it takes time to become proficient in cybersecurity. 39% of respondents believed it takes about 3-5 years to become proficient in the industry, 22% believe it takes 2-3 years and 18% believe it takes more than 5 years. In other words, cybersecurity professionals face numerous hurdles to become proficient in the industry. Thus, the gap between supply and demand for cybersecurity professionals only increases as time goes on.

Trend 2 - The use of artificial intelligence

Artificial intelligence (AI) is where machines learn to act on their own. The advancement in AI is greatly thanks to machine learning (ML). Machine learning takes data, such as images, clicks, words and numbers, and runs it through algorithms. Those algorithms are then used to detect patterns that are then used to feed deep learning. Deep learning finds the patterns and then amplifies them. These advancements have led to breakthroughs such as facial recognition and can in turn be used in the world of cybersecurity.

AI collects data that helps detect threats quicker. Based on analyzed behavior, AI can detect patterns and abnormalities. AI will also influence the traditional way companies protect themselves from cybersecurity attacks. Before, a company may implement many levels of security measures, such as firewalls, to control and monitor network traffic, anti-virus software to scan for malicious files, and regular file backups. But with AI, companies will be able to monitor and respond to security incidents, use firewalls with machine-learning to detect patterns, and understand the origin of cyberattacks.

Trend 3 - BYOD and Mobile Security

There was a time when employees only used company-issued devices. But with the proliferation of smart devices and onset of the pandemic, almost everyone comes to work with an internet-connected device. Bring your own device (BYOD) poses risks when employees are accessing work-related files on their personal devices rather than company-issued devices. It puts your organization at greater risk of data loss/theft, data breaches, network intrusions and employee distraction based on negligent practices. According to Trend Micro, 50% of companies that allowed BYOD were breached via employee-owned devices. 

Organizations can take steps to increase the security of personal device usage by defining a BYOD Policy. A BYOD Policy defines topics such as acceptable application/asset usage, minimum required security, company rights for altering the device, and company-provided components like device authentication. In a BYOD policy, consider including guidelines on topics such as password provisions, proper maintenance/updates and data wipe procedures. Digital Guardian provides an in depth look at what a BYOD policy should look like.

Trend 4 - Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) is the process that enhances security by requiring two pieces of evidence to log into an account. For example, logging into a website might require both a password and a code sent to your phone. According to the National Institute of Standards and Technology, there are three categories of credentials: something you know (such as a password), something you own (such as a phone), and something you are (such as a fingerprint). MFA requires two of these categories in order to enhance security. It introduces an extra level of security by creating another hurdle which hackers must jump over to access your account. Thus, a hacker would have to steal both your password and device. These days, it’s hard not to notice when your phone has gone missing.

Trend 5 - Cloud storage and protection

The cloud allows you to store your files on the internet rather than on your hard drive. In this way, you don’t lose access to your documents and data if a hacker gets hold of your laptop or personal device hard drive. Files stored on the cloud are also usually encrypted. There are several measures cloud service providers put in place to further protect your data. If you’re interested in migrating your infrastructure to the cloud, Cetrom uses AI technology and offers cybersecurity training to keep your employees and data safe.

Contact Us

The Next Generation of Wi-Fi Is Here - Introducing Wi-Fi 7

We all know it: when it comes to an online access point, the pursuit of a faster, more reliable internet connection is relentless. Recent strides in..
March 29,2024

Cetrom Support fixed all of my problems, their engineers are very professional, courteous, friendly and very efficient. If all customer service out there was like this, it would be a better world...

- Mid-sized
View All

One of the things we appreciate wholeheartedly about working with Cetrom is how great the people in the service area are and the high-level of responsiveness we have received. I’ve been very pleased..

- Mid-sized
View All

Cetrom’s services and support really stood out against the other cloud vendors. We thought their Citrix delivery platform would have a higher level of adoption because our employees would have the..

- Mid-sized
View All

Our accounting services users working in the field have greatly benefited from our migration to the cloud. They’re now able to be much more efficient while working in a client’s office because they..

- Mid-sized
View All

The decision to migrate to the cloud was one of the best business decisions Rub & Brillhart has made. It required an investment, but we have determined that our year two IT costs will be reduced by..

- Midwest
View All

Our migration process with Cetrom was very smooth and we had an excellent experience with their support during the demo process. We have 24/7 monitoring on our onsite equipment and they have the..

- Small
View All

We are extremely happy with the service and support we receive from Cetrom. Our staff is more efficient overall in our day-to-day activities and we don’t have any downtime. It’s a good feeling..

- Mid-sized
View All

Cetrom is an extremely cost-effective option for IT services. Not only do we receive significantly improved customer service, but we were also able to add a new VoIP system, better internet service,..

- Mid-sized
View All

Because we use specialized software for CPAs, we were concerned about the migration process. Cetrom’s CEO reassured us that there’s no concern because they understand how the software operates in the..

- Mid-sized
View All

We use two programs that often posed a challenge for our previous IT providers. Cetrom handled the situation professionally, coordinated with the software vendors, did all the backend testing, and..

- Mid-sized
View All

After interviewing and reviewing the proposals from various IT providers, it was really a night and day comparison about price, service, and performance—Cetrom was just outshining the others on every..

- Mid-sized
View All

I just want to drop you a line and let you know how pleased we are with our move to Cetrom. Your people knocked it out of the park for us and are doing a great job getting us up and working. On our..

- Small-sized
View All

Because we use specialized software for CPAs, we were concerned about the migration process. Cetrom’s CEO reassured us that there’s no concern because they understand how the software operates in the..

- 97%
View All

Cetrom’s Cloud Computing offers a high-quality, reliable and secure alternative to traditional IT management and provides immediate access to all my IT resources whether I’m in the office, at home or..

- High-quality,
View All

blog Archives

See all

The Next Generation of Wi-Fi Is Here - Introducing Wi-Fi 7

We all know it: when it comes to an online access point, the pursuit of a faster, more reliable internet connection is relentless. Recent strides in..
March 29,2024

Cetrom Support fixed all of my problems, their engineers are very professional, courteous, friendly and very efficient. If all customer service out there was like...

- Mid-sized
View All

Blog Archives

See all
Is Cetrom Your Cloud Services Solution?