Top five security trends to look out for in 2019

March 2019 Surveillance, Information Security

2018 was a year in which many countries focused on implementing and embracing new technologies. In tandem, many nations also witnessed cyber and physical security challenges such as back to back cyberattacks.

According to Emirates News Agency (WAM), 274 cyberattacks targeted the UAE alone for the first seven months of 2018, out of which 39 were extremely detrimental. That said, as we move forward to 2019, we clearly notice the continuation of several important trends and the development of some new ones. These trends will have an important role to play in the security sector.

From the continued focus on cybersecurity to the acquisition of global players, we have highlighted the top five security related trends to look forward to in 2019.

Continued focus on cybersecurity

The first trend we see is a continued focus on cybersecurity. There continues to be a growing number of high-profile breaches in our industry. Along with governmental regulations designed to strengthen security, privacy, and mitigate the damage caused by these increasing cyberattacks, we have to be more vigilant than ever. Cybercrime and criminal cyber activity are not only costly, but they can cause tremendous damage to an organisation’s reputation.

Recently, Facebook lost another 50 million users when its data was breached. While the financial cost may not represent a lot in terms of Facebook’s bottom line, the loss of trust and damage to their brand is significant.

Another important part of concerns around cybersecurity is the increasing awareness of untrustworthy devices. It has become clear that this lack of trust is not a function of engineering, but more often malicious intent that can come from any number of sources. For our part, we have developed countermeasures that can help isolate untrustworthy devices on the network. Our systems are customised to keep these untrustworthy devices from sending sensitive or private information to unauthorised recipients. It also protects other systems, including command and control systems, from being accessed.

All of us have a responsibility to protect our security platforms and networks, and all the systems they connect to through vigilance and transparency. As technology providers, we must ensure that we are not only good data stewards, but also upstanding global citizens.

Greater attention to risk assessment

Despite the fact that some businesses believe that their networks are secure, in many cases it takes mere seconds to guess device passwords and gain access to sensitive systems. When governments have concerns about potential risks to their systems, this naturally becomes an indication to other organisations that they too should take a closer look at their vulnerabilities. As a result, we are now seeing large organisations balancing out their risk assessment by leveraging cyber-litigation insurance. And this is surely to increase throughout 2019.

Increased unification that leads to better understanding

In terms of the technology, we are sure to see even more unification of systems in 2019. Organisations are already experiencing the benefits of unifying access control systems with video surveillance, and this will only grow. What will also increase is the ability to employ analytics tools to leverage the vast amounts of data that physical security systems and other devices are already collecting. When organisations are able to understand and leverage their data, they can use it to improve any number of business functions, including efficiency, operations, customer service and revenue generation.

The challenges here will arise around sharing information between stakeholders, particularly in terms of maintaining individual privacy and control over sensitive data. But we will see solutions that will allow for disparate organisations to collaborate effectively to achieve even greater understanding.

More organisations adopting hybrid cloud storage

We are seeing an increasing number of organisations moving their storage to hybrid-cloud solutions. This allows them to divide their data between cloud and on-premises options. There are tremendous benefits here as people can take advantage of the greater flexibility and cost-savings associated with cloud solutions — often for long term archival — while maintaining the all-important feeling of control of their data. This also includes having the business data secured and protected from Denial of Service (DDoS) attacks while protecting sensitive information and transaction.

Continued acquisition of global players

In recent years, we have seen several companies consolidate as major players acquire other organisations. While the bringing together of technology has the potential to yield compelling advancements, it can also slow test cycles for these businesses. 2019 will bring many opportunities for companies such as Genetec to help its end users and partners put an enterprise-grade security platform in place, with an open-architecture, scalable, and extensible solution.

For more information contact Genetec, Brent Cary, [email protected], www.genetec.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
Secure, modernise and optimise CCTV
Surveillance Products & Solutions
Industrial and commercial organisations are navigating complex digital transformation processes. With SecuVue, companies can bridge the gap between operational technology and information technology for safer, smarter operations.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Eagle Eye Precision Person & Vehicle Detection
Surveillance Products & Solutions AI & Data Analytics
Eagle Eye’s new Precision Person & Vehicle Detection feature detects people and vehicles at long distances with high accuracy and is especially designed for customers who actively monitor for intruders

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.