Top five security trends to look out for in 2019

March 2019 Surveillance, Information Security

2018 was a year in which many countries focused on implementing and embracing new technologies. In tandem, many nations also witnessed cyber and physical security challenges such as back to back cyberattacks.

According to Emirates News Agency (WAM), 274 cyberattacks targeted the UAE alone for the first seven months of 2018, out of which 39 were extremely detrimental. That said, as we move forward to 2019, we clearly notice the continuation of several important trends and the development of some new ones. These trends will have an important role to play in the security sector.

From the continued focus on cybersecurity to the acquisition of global players, we have highlighted the top five security related trends to look forward to in 2019.

Continued focus on cybersecurity

The first trend we see is a continued focus on cybersecurity. There continues to be a growing number of high-profile breaches in our industry. Along with governmental regulations designed to strengthen security, privacy, and mitigate the damage caused by these increasing cyberattacks, we have to be more vigilant than ever. Cybercrime and criminal cyber activity are not only costly, but they can cause tremendous damage to an organisation’s reputation.

Recently, Facebook lost another 50 million users when its data was breached. While the financial cost may not represent a lot in terms of Facebook’s bottom line, the loss of trust and damage to their brand is significant.

Another important part of concerns around cybersecurity is the increasing awareness of untrustworthy devices. It has become clear that this lack of trust is not a function of engineering, but more often malicious intent that can come from any number of sources. For our part, we have developed countermeasures that can help isolate untrustworthy devices on the network. Our systems are customised to keep these untrustworthy devices from sending sensitive or private information to unauthorised recipients. It also protects other systems, including command and control systems, from being accessed.

All of us have a responsibility to protect our security platforms and networks, and all the systems they connect to through vigilance and transparency. As technology providers, we must ensure that we are not only good data stewards, but also upstanding global citizens.

Greater attention to risk assessment

Despite the fact that some businesses believe that their networks are secure, in many cases it takes mere seconds to guess device passwords and gain access to sensitive systems. When governments have concerns about potential risks to their systems, this naturally becomes an indication to other organisations that they too should take a closer look at their vulnerabilities. As a result, we are now seeing large organisations balancing out their risk assessment by leveraging cyber-litigation insurance. And this is surely to increase throughout 2019.

Increased unification that leads to better understanding

In terms of the technology, we are sure to see even more unification of systems in 2019. Organisations are already experiencing the benefits of unifying access control systems with video surveillance, and this will only grow. What will also increase is the ability to employ analytics tools to leverage the vast amounts of data that physical security systems and other devices are already collecting. When organisations are able to understand and leverage their data, they can use it to improve any number of business functions, including efficiency, operations, customer service and revenue generation.

The challenges here will arise around sharing information between stakeholders, particularly in terms of maintaining individual privacy and control over sensitive data. But we will see solutions that will allow for disparate organisations to collaborate effectively to achieve even greater understanding.

More organisations adopting hybrid cloud storage

We are seeing an increasing number of organisations moving their storage to hybrid-cloud solutions. This allows them to divide their data between cloud and on-premises options. There are tremendous benefits here as people can take advantage of the greater flexibility and cost-savings associated with cloud solutions — often for long term archival — while maintaining the all-important feeling of control of their data. This also includes having the business data secured and protected from Denial of Service (DDoS) attacks while protecting sensitive information and transaction.

Continued acquisition of global players

In recent years, we have seen several companies consolidate as major players acquire other organisations. While the bringing together of technology has the potential to yield compelling advancements, it can also slow test cycles for these businesses. 2019 will bring many opportunities for companies such as Genetec to help its end users and partners put an enterprise-grade security platform in place, with an open-architecture, scalable, and extensible solution.

For more information contact Genetec, Brent Cary, bcary@genetec.com, www.genetec.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
The AI goldrush has a credibility problem
Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...
Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.