A quantum leap

February 2018 Cyber Security

Organisations today are embracing technology at an ever-greater pace to better equip, enable and empower their business for the future. From the creation of new business streams, to developing a competitive advantage, the leader’s role is becoming increasingly pivotal in defining the businesses needs and implementing the technology to facilitate change. In an environment where technology is developing and maturing at an exponential rate, leaders must always be looking ahead – so what does 2018 have in store?

Ronald Ravel.
Ronald Ravel.

Undoubtedly, one of the key dates for next year is the deadline for General Data Protection Regulation (GDPR) compliance which comes into effect on 25 May 2018. It’s important for South African businesses which conduct business in the EU to understand exactly how they will be affected. According to the legislation, any company which processes the personal data of EU residents in connection with the offering of goods or services, or monitors the behaviour of those residents, may need to comply.

To complicate matters, South African companies also need to comply with the Protection of Personal Information Act (PoPI). Fortunately, the provisions across the two pieces of data protection legislation are so similar that complying with the GDPR means complying with PoPI should be smooth sailing.

Yet, faced with the risks of penalties and even legal action, worryingly many are underprepared with over 50% of companies expected to not be in full compliance before the end of 2018. Never has it been more important for organisations to identify ways to best manage their data.

In addition, organisations will continue to be faced with an exponential growth in cybercrime. Ransomware damages alone were expected to rise fifteen times from 2015, hitting $5bn globally this year. Simultaneously, technology is fuelling a transition towards mobile and remote working, ushering in a new era of productivity, and bringing with it new security challenges.

To address the increasingly complex regulatory environment, the growth in cybercrime, and adoption of mobile working practices, we expect to see a growth in the acceptance and education of some specific technology trends. These include: quantum cryptography, Edge Computing, and cloud-based virtual desktop infrastructures.

Quantum cryptography

The basic building blocks of computing are set to morph from maths to physics in the future with the introduction of quantum computing. Global industry analysts forecast its global market to reach $2 billion by 2024, a growth which is primarily driven by a constant need for the most secure online data transmission possible. From this, quantum cryptography is emerging as a highly-evolved protection method, necessary to combat ever-increasing security threats. This method can produce a message unreadable to all except its specific, intended recipient, called quantum key distribution (QKD), whereby ‘keys’ are distributed as photons, usually light rays, which if intercepted, will immediately change state rendering itself unreadable.

Recently, Toshiba made a breakthrough with quantum cryptography at its Cambridge Research Laboratory by creating the world’s fastest QKD device. Attaining a speed of 3.7 Mbps per second – roughly seven times faster than Toshiba’s previous record speed of 1.9 Mbps – this breakthrough brings the practical utilisation of quantum technology one step closer to the wider global community.

Edge computing

With data proliferation coming from the rise of IoT and the predicted capabilities of 5G in 2018, edge computing will become ever more vital. For organisations that handle large amounts of data, deciphering what to send to the cloud can reduce backlogs, allowing it to perform the heavier tasks while edge computing technology allows increased mobility and real-time processing, thus increasing efficiency at both ends of an organisation’s IT chain.

Wearables, such as smart glasses, will work in harmony with edge computing, helping to both streamline processes within organisations in ever more remote or mobile environments. Take the NHS in the UK for example, utilising a wide variety of end-point devices such as smart glasses to access locally stored data, healthcare providers

can collect and analyse patient data from the edge in real time while interacting with patients. This will enable healthcare providers to dramatically increase their efficiency when consulting with patients, while more data can be sent to the cloud for further diagnosis.

Mobile zero clients

As organisations adopt more mobile and flexible working practices, security needs to be the number one priority to successfully embrace the benefits of mobility without falling victim to the increased threat of cybercrime. Organisations have already seen the benefits of thin client solutions, however, because of cost and limitations that restrict remote working, more will move towards zero client solutions which completely remove storage from devices, using external servers to drive operating systems with data access through a cloud-based virtual desktop infrastructure (VDI). By using zero client solutions data is protected against malware and security issues should a device be lost or stolen.

Whether preparing for regulatory change, protecting against the ever-expanding cyber threat landscape, or addressing trends like mobile working, 2018 will be a year of digital transformation and learning for many organisations. While technology such as quantum cryptography is still evolving, it is already offering equal opportunities for cryptographers and hackers, so organisations need to start considering how it will impact them now.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON modernises its security operations using MDR
iOCO Software News Cyber Security
The landscape of cyber threats has evolved dramatically, with cybercriminals becoming more interconnected and resourceful. This shift has necessitated the rapid acceleration of MDR services, which serve as a formidable bulwark against the modern adversary and promote business resilience.

Read more...
Protect your financial assets from unknown online threats
Products Cyber Security Financial (Industry)
Malicious actors employ a myriad of sophisticated techniques, such as hacking, phishing, spamming, card theft, online fraud, vishing, and keylogging, among others, to exploit unsuspecting individuals and gain unauthorised access to their financial resources.

Read more...
Cyber incidents result in a 9% decrease in shareholder value
News Cyber Security
Aon published its 2023 Cyber Resilience Report, revealing that, on average, a significant cyber incident resulted in a 9% decrease in shareholder value – over and above the market – in the year following the event.

Read more...
Automated ransomware recovery
Products Cyber Security
Organisations can now automatically recover from ransomware attacks with the capabilities in Cisco XDR, where the company is adding recovery to the response process by including infrastructure and enterprise data backup and recovery vendors.

Read more...
NIST’s impact on cybersecurity
Cyber Security
Through its NIST Cybersecurity Framework, the non-regulatory agency empowers organisations to take a proactive approach towards managing and mitigating cyber risks, enabling them to stay resilient against the ever-evolving threat landscape.

Read more...
Best practice tips for strengthening data privacy system
Security Services & Risk Management Cyber Security
International cybercriminals are increasingly targeting South African organizations, making data privacy more difficult to maintain. A standardization expert offers insight to help combat this threat.

Read more...
AI-powered cyber protection for consumers
IT infrastructure Cyber Security
Acronis Cyber Protect Home Office is designed for the evolving landscape of cyber threats by integrating Acronis' cyber protection and secure backup solutions, combining AI-powered defence mechanisms, robust data backup, remote management tools, and mobile device protection.

Read more...
A surge of cybersecurity for the energy sector
Government and Parastatal (Industry) Cyber Security
With a rapid transition towards renewable energy, the energy sector has an increased reliance on technology. This makes it particularly vulnerable with regards to cybersecurity, as it depends on interconnected systems and digital technologies.

Read more...
Secure backup strategies imperative for business continuity
IT infrastructure Cyber Security
Cybercrime is on the rise, and businesses need to adjust how they manage their data to fend off attackers, or risk irreparable damage, writes Lisa Strydom, Senior Manager Channel and Alliance for Africa at Veeam Software.

Read more...
CHI selects NEC XON as trusted cybersecurity partner
News Cyber Security Industrial (Industry)
CHI Limited, Nigeria's leading market player in fruit juices and dairy products, has engaged in a strategic cybersecurity partnership with NEC XON, a pan-African ICT systems integrator.

Read more...