Cloudy With a Chance of IoT Attacks: The Cybersecurity Forecast for 2019
2019 will bring its own threats with the propagation of new technology — 5G and IoT — and their security vulnerabilities. But there's also progress on the horizon, thanks to more stringent government regulation and increasing legal action.
January 04, 2019 at 07:00 AM
6 minute read
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
2018 was a trying year for the cybersecurity industry, with breaches increasing and showing no signs of slowing as we enter the New Year. This is in part, a consequence of easily accessible malware and deployment kits, and the threats aren't going to disappear with the New Year champagne bubbles, and 2019 will bring its own threats with the propagation of new technology — 5G and IoT — and their security vulnerabilities. However, there's also progress on the horizon, thanks to more stringent government regulation and increasing legal action.
|The Barrier of Entry for Cyber Criminals Gets Lower
Not even the largest companies, with presumably the greatest resources available, have been able to protect themselves from massive attacks in 2018. In the past few months alone, it has been reported that 500,000 Google+ accounts could have been left exposed thanks to a bug, leading to the ill-fated site promptly being shut down; Facebook confessed that up to 29 million users were affected by its data breach; and Amazon came under sharp criticism for exposing an undisclosed number of customer details shortly before Black Friday. And that's just in the U.S. On the international stage, the world was shocked in October as Hong Kong airline Cathay Pacific disclosed that a massive 9.4 million passenger records were lost earlier in the year.
This increase in cyber attacks and the diversification of targets is a consequence of the low barrier to entry for cybercriminals. It is getting cheaper and easier to launch mass attacks, and this barrier is being reduced even further as criminals sell ready-made solutions for attacks. Today, the cyber crime market is so sophisticated that some malware developers even provide “technical support” and universal Trojans appearing on the shadow market can be used for everything from espionage and data theft to remote device management. And still, the demand for malware development and distribution significantly exceeds the supply.
While many of these attacks will be repelled, 2018 has taught us that many do succeed and even the largest organizations are failing to stop every attack. Meanwhile, as it becomes increasingly easy to access and deploy malware, mass attacks will continue to prevail over targeted attacks in 2019.
|New Technologies Bring New Threat Vectors
The last decade has seen a huge wave of innovation and a massive number of devices come to market. However, as is always the case, innovation leads and security follows. Devices continue to be launched with errors and vulnerabilities, and this represents a significant threat.
The Internet of Things (IoT) is the epitome of this problem. Any device that has wireless connectivity can be hacked. mPOS (Mobile Point of Sale) terminals to vacuum cleaners. As we see ever more smart devices on the market in 2019, no doubt with default passwords or non-closed vulnerabilities, these are very likely to become a sore spot for their owners.
IoT devices are a favorite weapon for attackers who use them to penetrate local networks and conduct other attacks. As consumers slowly learn how to protect their PCs and mobile devices, they will also need to learn how to stay safe as more of their traditional appliances go online. The security industry, too, will have to adjust to this new reality.
On a related note, as it is the network that many of these devices will eventually exist on, the gradual introduction of 5G is likely to bring challenges in 2019. For example, Verizon and Samsung have already announced that they will offer 5G smartphones in the U.S.
This is a key issue because the telecom industry has always had a turbulent relationship with security. For example, although operators are well aware of potential issues, 78% of telecom networks are vulnerable to attacks. SMS interception, for example, is still possible in nine cases out of 10.
This is also a complicated issue to solve because, in order to increase the protection level, current standards and operating procedures of signaling networks have to be reviewed. 5G mobile networks are currently under development, but no significant progress in security has been achieved so far. Even once agreed, it may take years for a new security technology to become actively used on the network, which means that the first wave of 5G-enabled devices will be inherently vulnerable.
|Government Legislation Leads Cyber Security Gains
However, it is not all bad news. 2018 saw more stringent regulatory requirements from governments the world over, and in 2019 we're likely to see this groundwork start to pay off as companies strengthen protection to comply with these mandates.
It shouldn't be overlooked that the end of 2018 also saw a number of security-related sanctions: Anthem reached a settlement of $16 million with the U.S. government for its 2015 data breach, Facebook was fined $645,000 by the UK's regulator over the Cambridge Analytica scandal, and Yahoo agreed to a $50 million settlement for those affected by the 2013 data breach. With governments and consumers finally having legal recourse to hold companies to account, it will become increasingly hard for organizations to turn a blind eye to security vulnerabilities. It's a slow process, but already we are seeing the basic standards of security rise, which will make executing an attack that much harder for cyber criminals.
Governments are also becoming increasingly aware of the opportunities offered by cyber space, with more and more creating their own Cyber Security Centers and Cyber Forces. The world has begun to recognize the necessity of such systems.
The security challenges of this year will not be solved overnight — and technological development goes hand in hand with new security challenges — but there is hope for positive developments as well. This, of course, is dependent on cybersecurity remaining a priority for governments, and there is work to be done in passing more stringent legislation, not least in the U.S. telecoms, for example, must be a focus for governments. If not, the dawn of 5G and the propagation of IoT devices could open a Pandora's box of new security challenges.
Leigh-Anne Galloway serves as Cyber Security Resilience Lead at Positive Technologies, where she advises organizations on how best to secure their applications and infrastructure against modern threats. Before joining Positive Technologies, Leigh-Anne worked with companies such as SilverTail Systems (acquired by EMC) and vArmour where she helped shape the direction of each detection platform. Across her career, she has had the opportunity to work with a diversity of organizations, implementing monitoring tools to detect and prevent fraud and security incidents from occurring.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1Haynes Boone, Hicks Thomas Get Dismissal of $1.3B Claims in 2022 Freeport LNG Terminal Explosion
- 2Immigration Under the Trump Administration: Five Things to Expect in the First 90 Days
- 3'Radical Left Judges'?: Trump Demands GOP Unity Against Biden's Judicial Picks
- 4NY District Attorneys Are Still No Fans of Revamped Misconduct Watchdog
- 5ICC Issues Arrest Warrants for Israel's Prime Minister Over Alleged War Crimes in Gaza
Who Got The Work
Michael G. Bongiorno, Andrew Scott Dulberg and Elizabeth E. Driscoll from Wilmer Cutler Pickering Hale and Dorr have stepped in to represent Symbotic Inc., an A.I.-enabled technology platform that focuses on increasing supply chain efficiency, and other defendants in a pending shareholder derivative lawsuit. The case, filed Oct. 2 in Massachusetts District Court by the Brown Law Firm on behalf of Stephen Austen, accuses certain officers and directors of misleading investors in regard to Symbotic's potential for margin growth by failing to disclose that the company was not equipped to timely deploy its systems or manage expenses through project delays. The case, assigned to U.S. District Judge Nathaniel M. Gorton, is 1:24-cv-12522, Austen v. Cohen et al.
Who Got The Work
Edmund Polubinski and Marie Killmond of Davis Polk & Wardwell have entered appearances for data platform software development company MongoDB and other defendants in a pending shareholder derivative lawsuit. The action, filed Oct. 7 in New York Southern District Court by the Brown Law Firm, accuses the company's directors and/or officers of falsely expressing confidence in the company’s restructuring of its sales incentive plan and downplaying the severity of decreases in its upfront commitments. The case is 1:24-cv-07594, Roy v. Ittycheria et al.
Who Got The Work
Amy O. Bruchs and Kurt F. Ellison of Michael Best & Friedrich have entered appearances for Epic Systems Corp. in a pending employment discrimination lawsuit. The suit was filed Sept. 7 in Wisconsin Western District Court by Levine Eisberner LLC and Siri & Glimstad on behalf of a project manager who claims that he was wrongfully terminated after applying for a religious exemption to the defendant's COVID-19 vaccine mandate. The case, assigned to U.S. Magistrate Judge Anita Marie Boor, is 3:24-cv-00630, Secker, Nathan v. Epic Systems Corporation.
Who Got The Work
David X. Sullivan, Thomas J. Finn and Gregory A. Hall from McCarter & English have entered appearances for Sunrun Installation Services in a pending civil rights lawsuit. The complaint was filed Sept. 4 in Connecticut District Court by attorney Robert M. Berke on behalf of former employee George Edward Steins, who was arrested and charged with employing an unregistered home improvement salesperson. The complaint alleges that had Sunrun informed the Connecticut Department of Consumer Protection that the plaintiff's employment had ended in 2017 and that he no longer held Sunrun's home improvement contractor license, he would not have been hit with charges, which were dismissed in May 2024. The case, assigned to U.S. District Judge Jeffrey A. Meyer, is 3:24-cv-01423, Steins v. Sunrun, Inc. et al.
Who Got The Work
Greenberg Traurig shareholder Joshua L. Raskin has entered an appearance for boohoo.com UK Ltd. in a pending patent infringement lawsuit. The suit, filed Sept. 3 in Texas Eastern District Court by Rozier Hardt McDonough on behalf of Alto Dynamics, asserts five patents related to an online shopping platform. The case, assigned to U.S. District Judge Rodney Gilstrap, is 2:24-cv-00719, Alto Dynamics, LLC v. boohoo.com UK Limited.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250