Information security trends for 2019

0
4

ESET experts share their trends report on cybersecurity issues that will be highlighted over the next year.

ESET, a leading proactive threat detection company, presents its report “Trends 2019: Privacy and intrusion into the global village”. It puts the focus on data protection and privacy, highlighting the role of virtual currencies, machine learning and connected smart devices.

“The cyber, data leaks, and cases in which customer and user privacy control failures were reported during 2018, make clear the challenge of securing asset protection. Therefore, the practical objectives of information security should be focused on safeguarding the confidentiality, integrity and availability of computer systems and data. “, Commented Camilo Gutierrez, head of the Research Laboratory of ESET Latin America.

ESET’s report “Trends 2019” reflects on the importance and responsibility of companies in protecting the large volumes of data they have compiled over the years.

The 2018 was highlighted in the history of data privacy, because the European Union (EU) made effective the General regulations on Data Protection (GDPR), which has implications for any organization (regardless of its Location) that handles personal information of EU citizens. According to ESET’s report, other parts of the world will take the EU path, and also analyze the possibility of a global law.

As for malware, the report stands for 2019 that used for Criptocoins mining illegally. Although it was not the main topic of 2018, the illegal mining of Criptocoins had a growth in terms of propagation (within which the practice known as criptojacking is highlighted) so it will surely occupy a prominent place in the scenario of the Threats for next year.

On the other hand, the role of intelligent households is highlighted from the use of voice assistants. The existing possibilities that criminals can take advantage of interconnected IoT devices in the home and thus invade privacy, also highlights the role of users linked to the amount and type of data that is shared with these Artifacts.

In this context, the report has a section dedicated to Machine Learning (ML). This technology, based on the generation of information from the automated analysis of large volumes of data, also gained space in the field of cybersecurity.

While the algorithms used might allow developers to identify current threats more efficiently, it can also be used by malicious actors to develop automated tasks and obtain white information Vulnerable. The ESET report explains the potential of this technology for both attackers and those who are in charge of security.