A quantum leap

February 2018 Information Security

Organisations today are embracing technology at an ever-greater pace to better equip, enable and empower their business for the future. From the creation of new business streams, to developing a competitive advantage, the leader’s role is becoming increasingly pivotal in defining the businesses needs and implementing the technology to facilitate change. In an environment where technology is developing and maturing at an exponential rate, leaders must always be looking ahead – so what does 2018 have in store?

Ronald Ravel.
Ronald Ravel.

Undoubtedly, one of the key dates for next year is the deadline for General Data Protection Regulation (GDPR) compliance which comes into effect on 25 May 2018. It’s important for South African businesses which conduct business in the EU to understand exactly how they will be affected. According to the legislation, any company which processes the personal data of EU residents in connection with the offering of goods or services, or monitors the behaviour of those residents, may need to comply.

To complicate matters, South African companies also need to comply with the Protection of Personal Information Act (PoPI). Fortunately, the provisions across the two pieces of data protection legislation are so similar that complying with the GDPR means complying with PoPI should be smooth sailing.

Yet, faced with the risks of penalties and even legal action, worryingly many are underprepared with over 50% of companies expected to not be in full compliance before the end of 2018. Never has it been more important for organisations to identify ways to best manage their data.

In addition, organisations will continue to be faced with an exponential growth in cybercrime. Ransomware damages alone were expected to rise fifteen times from 2015, hitting $5bn globally this year. Simultaneously, technology is fuelling a transition towards mobile and remote working, ushering in a new era of productivity, and bringing with it new security challenges.

To address the increasingly complex regulatory environment, the growth in cybercrime, and adoption of mobile working practices, we expect to see a growth in the acceptance and education of some specific technology trends. These include: quantum cryptography, Edge Computing, and cloud-based virtual desktop infrastructures.

Quantum cryptography

The basic building blocks of computing are set to morph from maths to physics in the future with the introduction of quantum computing. Global industry analysts forecast its global market to reach $2 billion by 2024, a growth which is primarily driven by a constant need for the most secure online data transmission possible. From this, quantum cryptography is emerging as a highly-evolved protection method, necessary to combat ever-increasing security threats. This method can produce a message unreadable to all except its specific, intended recipient, called quantum key distribution (QKD), whereby ‘keys’ are distributed as photons, usually light rays, which if intercepted, will immediately change state rendering itself unreadable.

Recently, Toshiba made a breakthrough with quantum cryptography at its Cambridge Research Laboratory by creating the world’s fastest QKD device. Attaining a speed of 3.7 Mbps per second – roughly seven times faster than Toshiba’s previous record speed of 1.9 Mbps – this breakthrough brings the practical utilisation of quantum technology one step closer to the wider global community.

Edge computing

With data proliferation coming from the rise of IoT and the predicted capabilities of 5G in 2018, edge computing will become ever more vital. For organisations that handle large amounts of data, deciphering what to send to the cloud can reduce backlogs, allowing it to perform the heavier tasks while edge computing technology allows increased mobility and real-time processing, thus increasing efficiency at both ends of an organisation’s IT chain.

Wearables, such as smart glasses, will work in harmony with edge computing, helping to both streamline processes within organisations in ever more remote or mobile environments. Take the NHS in the UK for example, utilising a wide variety of end-point devices such as smart glasses to access locally stored data, healthcare providers

can collect and analyse patient data from the edge in real time while interacting with patients. This will enable healthcare providers to dramatically increase their efficiency when consulting with patients, while more data can be sent to the cloud for further diagnosis.

Mobile zero clients

As organisations adopt more mobile and flexible working practices, security needs to be the number one priority to successfully embrace the benefits of mobility without falling victim to the increased threat of cybercrime. Organisations have already seen the benefits of thin client solutions, however, because of cost and limitations that restrict remote working, more will move towards zero client solutions which completely remove storage from devices, using external servers to drive operating systems with data access through a cloud-based virtual desktop infrastructure (VDI). By using zero client solutions data is protected against malware and security issues should a device be lost or stolen.

Whether preparing for regulatory change, protecting against the ever-expanding cyber threat landscape, or addressing trends like mobile working, 2018 will be a year of digital transformation and learning for many organisations. While technology such as quantum cryptography is still evolving, it is already offering equal opportunities for cryptographers and hackers, so organisations need to start considering how it will impact them now.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...
Cybersecurity in South Africa
Information Security
According to the Allianz Risk Barometer 2025, cyber incidents, including ransomware attacks, data breaches and IT outages, are now the top global business risk, marking their fourth year at the top.

Read more...
Are AI agents a game-changer?
Information Security
While AI-powered chatbots have been around for a while, AI agents go beyond simple assistants, functioning as self-learning digital operatives that plan, execute, and adapt in real time. These advancements do not just enhance cybercriminal tactics, they may fundamentally change the battlefield.

Read more...
Disaster recovery vs cyber recovery
Information Security
Disaster recovery centres on restoring IT operations following events like natural disasters, hardware failures or accidents, while cyber recovery is specifically tailored to address intentional cyberthreats such as ransomware and data breaches.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
The rise of AI-powered cybercrime and defence
Information Security News & Events AI & Data Analytics
Check Point Software Technologies launched its inaugural AI Security Report, offering an in-depth exploration of how cybercriminals are weaponising artificial intelligence (AI), alongside strategic insights defenders need to stay ahead.

Read more...
The deepfake crisis is here and now
Information Security Training & Education
Deepfakes are a growing cybersecurity threat that blur the line between reality and fiction. These AI-generated synthetic media have evolved from technological curiosities to sophisticated weapons of digital deception, costing companies upwards of $600 000 each.

Read more...
What does Agentic AI mean for cybersecurity?
Information Security AI & Data Analytics
AI agents will change how we work by scheduling meetings on our behalf and even managing supply chain items. However, without adequate protection, they become soft targets for criminals.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...