2019 cybersecurity crystal ball

February 2019 Editor's Choice, Information Security

Every January of every year, experts in all fields of cybersecurity put on their thinking caps and, alone or in group think tanks, wrack their brains about the perils facing us in the year ahead. They attempt to get into the minds and thought patterns of attackers, but invariably come back to the same question and answer: How long is a piece of string?

Craig Rosewarne.
Craig Rosewarne.

Most experts will claim that their domain is most at risk and should therefore claim the larger slice of the annual cyber spend. One thing is abundantly clear, what goes around comes around (with some tweaks to the code) with a few new surprises thrown in.

Wolfpack Information Risk undertook research, both online and vis-à-vis, to try and gauge the feelings of those in the industry and other outside players. The slight majority fall into the following categories.

Volatility – will 2019 be more volatile than 2018?

Every responder replied in the affirmative. Most international experts were of the same opinion.

Most sought-after asset for attackers?

A small word with massive implications – data. According to Wolfpack senior consultant, Mitch Sowden, ‘’There is a lack of appreciation pertaining to the value and ownership of data assets.’’ An attacker’s ultimate aim when targeting an organisation is its crown jewels. They are worth a fortune whether ransomed, stolen, exfiltrated for sale or used in future attacks against the organisation, subsidiaries, suppliers and stakeholders of the entity.

Data is an enormous asset, yet a major burden to an organisation as well. Sowden continues, ‘’understanding the value of assets and the actual risks faced can achieve a balance between cyber spend and ROI.’’

Although the long sought-after promulgation of PoPIA and that EU GDPR has finally happened, it remains to be seen if they will be the promised watchdogs and guardians of data or toothless hounds with more bark than bite.

Who will be 2019’s most active threat actors?

Many still feel that 2019 will belong to cyber criminals, both organised and otherwise, whose main focus is on monetary gain. However, nation states and terrorism will play a major part in assaults this year.

According to Mike McKee, CEO, ObserveIT, “We expect nation-state threats to increase significantly in 2019, particularly targeting critical infrastructure. Critical infrastructure systems are extremely vulnerable to both cybersecurity and physical security risks. State-sponsored threats and high-level hackers are constantly looking to gain access to the critical infrastructure of nations worldwide, with the intent of hitting some of our most valuable systems (national security, public health, emergency communications, and more”.

Observers are anxiously scanning the skies and space as previously immune satellites used in communications, science and the military are open to cyber-attacks. As the saying goes, ‘’He who controls the skies (space) controls the battle.” The loss of these crucial assets will be catastrophic for governments and humankind in general.

Although a cyberwar is looming, many nation states are using proxies to test the waters to determine the extent that cyber weapons can be included in their armouries. Further, disinformation campaigns and voter rigging is already seen to be happening and pinning the blame is increasingly difficult.

AI/IoT/cloud

The above, in their purest forms of thinking and invention, could really benefit all of humankind. The Dark Side, however, has seen the potential in far more sinister ways. AI can be used relatively easily to disseminate millions of craftily conceived phishing and social media attacks with minimal human help. Rogue chatbots, currently using text messages, could soon evolve into slick talking instruments to get people to click on links or open attachments which are malicious. Unlike ethical businesses that are extremely protective over their intellectual property, bad actors often freely share their knowledge and products or offer it for sale at bargain prices.

On the positive side, AI, can be extremely helpful in protecting systems from attack by sifting through chatter, static and false positives that torment organisations daily. However, current AI needs to be streamlined to offer more quality services than quantity.

As far as IoT is concerned, volumes can be written. As with AI, devices conceived to make our lives simpler, safer and easier have turned and bitten the hands that created them. CCTV systems to help protect against intruders are now welcoming them in and guiding them to the mother lode of an organisation or state department. Driverless cars are deemed suitable ‘vehicles’ to assassinate, kidnap or simply hinder innocent people. Smart systems in your car can give an overview of your daily routine, routes, preferences and habits. In the race to get out new products before the competitor, manufacturers are bypassing best practice security and leaving many devices woefully exposed.

The cloud, the mighty cloud. It doesn’t take a rocket scientist to see where the most lucrative data, intellectual property, company secrets, celeb pics, etc. are stored and the enormous wealth associated with it. 2019 will most likely see renewed, more advanced attacks on cloud service providers. Why aim for a few thousand records when you can get hundreds of millions in one foul swoop. Watch this space.

What about other threats?

Make no mistake, the usual ‘oldies but goldies’ will still be around this year and for years to come. ‘’We will however see an increase in extortion/sextortion-based attacks and a huge leap in scams thanks to the large volumes of information available which attackers use to create more personalised messages to trick their victims.’’

Keep safe out there.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Check Point launches African Perspectives on Cybersecurity report
News & Events Information Security
Check Point Software Technologies released its African Perspectives on Cybersecurity Report 2025, revealing a sharp rise in attacks across the continent and a major shift in attacker tactics driven by artificial intelligence

Read more...
What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Kaspersky finds security flaws that threaten vehicle safety.
News & Events Information Security Transport (Industry)
At its Security Analyst Summit 2025, Kaspersky presented the results of a security audit that exposed a significant security flaw enabling unauthorised access to all connected vehicles of one automotive manufacturer.

Read more...
GenAI fraud forcing banks to shift from identity to intent
AI & Data Analytics Information Security Financial (Industry)
The complexity and velocity of modern fraud schemes, from deepfakes to fraud and scams involving social engineering, demand more than just investment in new tools; they need adaptability and expanding the security net.

Read more...
Cyber attack surface expanding
Asset Management Information Security Logistics (Industry)
Despite the increasing number of attacks, analysis of Allianz Commercial cyber claims shows that severity is down by 50% and large-claim frequency by 30% in H1 2025, driven by larger companies’ enhanced detection and response capabilities.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.