Top five security trends to look out for in 2019

March 2019 Surveillance, Information Security

2018 was a year in which many countries focused on implementing and embracing new technologies. In tandem, many nations also witnessed cyber and physical security challenges such as back to back cyberattacks.

According to Emirates News Agency (WAM), 274 cyberattacks targeted the UAE alone for the first seven months of 2018, out of which 39 were extremely detrimental. That said, as we move forward to 2019, we clearly notice the continuation of several important trends and the development of some new ones. These trends will have an important role to play in the security sector.

From the continued focus on cybersecurity to the acquisition of global players, we have highlighted the top five security related trends to look forward to in 2019.

Continued focus on cybersecurity

The first trend we see is a continued focus on cybersecurity. There continues to be a growing number of high-profile breaches in our industry. Along with governmental regulations designed to strengthen security, privacy, and mitigate the damage caused by these increasing cyberattacks, we have to be more vigilant than ever. Cybercrime and criminal cyber activity are not only costly, but they can cause tremendous damage to an organisation’s reputation.

Recently, Facebook lost another 50 million users when its data was breached. While the financial cost may not represent a lot in terms of Facebook’s bottom line, the loss of trust and damage to their brand is significant.

Another important part of concerns around cybersecurity is the increasing awareness of untrustworthy devices. It has become clear that this lack of trust is not a function of engineering, but more often malicious intent that can come from any number of sources. For our part, we have developed countermeasures that can help isolate untrustworthy devices on the network. Our systems are customised to keep these untrustworthy devices from sending sensitive or private information to unauthorised recipients. It also protects other systems, including command and control systems, from being accessed.

All of us have a responsibility to protect our security platforms and networks, and all the systems they connect to through vigilance and transparency. As technology providers, we must ensure that we are not only good data stewards, but also upstanding global citizens.

Greater attention to risk assessment

Despite the fact that some businesses believe that their networks are secure, in many cases it takes mere seconds to guess device passwords and gain access to sensitive systems. When governments have concerns about potential risks to their systems, this naturally becomes an indication to other organisations that they too should take a closer look at their vulnerabilities. As a result, we are now seeing large organisations balancing out their risk assessment by leveraging cyber-litigation insurance. And this is surely to increase throughout 2019.

Increased unification that leads to better understanding

In terms of the technology, we are sure to see even more unification of systems in 2019. Organisations are already experiencing the benefits of unifying access control systems with video surveillance, and this will only grow. What will also increase is the ability to employ analytics tools to leverage the vast amounts of data that physical security systems and other devices are already collecting. When organisations are able to understand and leverage their data, they can use it to improve any number of business functions, including efficiency, operations, customer service and revenue generation.

The challenges here will arise around sharing information between stakeholders, particularly in terms of maintaining individual privacy and control over sensitive data. But we will see solutions that will allow for disparate organisations to collaborate effectively to achieve even greater understanding.

More organisations adopting hybrid cloud storage

We are seeing an increasing number of organisations moving their storage to hybrid-cloud solutions. This allows them to divide their data between cloud and on-premises options. There are tremendous benefits here as people can take advantage of the greater flexibility and cost-savings associated with cloud solutions — often for long term archival — while maintaining the all-important feeling of control of their data. This also includes having the business data secured and protected from Denial of Service (DDoS) attacks while protecting sensitive information and transaction.

Continued acquisition of global players

In recent years, we have seen several companies consolidate as major players acquire other organisations. While the bringing together of technology has the potential to yield compelling advancements, it can also slow test cycles for these businesses. 2019 will bring many opportunities for companies such as Genetec to help its end users and partners put an enterprise-grade security platform in place, with an open-architecture, scalable, and extensible solution.

For more information contact Genetec, Brent Cary, bcary@genetec.com, www.genetec.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Duxbury SA Milesight distributor
Duxbury Networking News & Events Surveillance
Duxbury Networking has been appointed the exclusive distributor of Milesight surveillance solutions in South Africa, expanding its surveillance portfolio with a platform designed to deliver AI-driven analytics, rapid deployment, and open integration for modern security environments.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
Transforming video surveillance into strategic intelligence
Secutel Technologies Products & Solutions Surveillance
In a world where risk moves faster, and operations are more interconnected than ever, you need more than footage — you need insight.

Read more...
Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.