Your 2018 Cyber Security ‘To Do’ List

Posted by Allison Boccamazzo on Jan 26, 2018 10:01:00 AM

A lot happened in 2017 in terms of cyber security. From major hotel groups to national food chains, gaming companies to high-end retailers…no one seemed to be spared by today’s evolving threat landscape.

Your 2018 Cyber Security ‘To Do’ List

We’ve covered cyber security extensively on our blog (like here, here and here), but now it’s time to look beyond the horizon. A new year signifies emerging new threats, challenges and security precautions that must be taken. This bring us to Dimension Data’s new “Top IT Trends in 2018” report. Consider this overview an easy ‘to do’ list for starting the new year right:

  1. Consider a ‘zero trust’ security model: Zero trust architecture is expected to make waves in 2018. The model—rooted in the principle of “never trust, always verify”—is designed to address threat movements both inside and outside the network by leveraging micro-segmentation and granular perimeters enforcement. This model requires more rigorous authentication measures based on variables like data and location to verify user identities.
  1. Manufacturers: deception technologies for OT and IoT: As Dimension Data explains, operational technology (OT) is increasingly enabling the Internet of Things (IoT) in manufacturing; however, the sensors attached to OT devices pose new cyber risks. Deception technology will rise as a new form of defense in 2018 for detecting and analyzing advanced attacks in these OT and IoT environments.
  1. AI for better threat detection: The rise of deep learning has introduced a new era of behavioral analytics, which will be particularly helpful for detecting cyber threats. Dimension Data, for example, paints the picture of a machine analyzing online behavior over a specific period of time and being able to predictively verify a person attempting to access data or applications.

For more 2018 cyber security recommendations (including robo-hunters and blockchain), check out Dimension Data’s full report here.

Interested in seeing how VoIP Innovations can help you beat the cyber security threats? Contact us today for a free consultation!

Contact Us >

 

Download our Definitive Guide to CPaaS
Back to Blog Home >>

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all