A quantum leap

February 2018 Information Security

Organisations today are embracing technology at an ever-greater pace to better equip, enable and empower their business for the future. From the creation of new business streams, to developing a competitive advantage, the leader’s role is becoming increasingly pivotal in defining the businesses needs and implementing the technology to facilitate change. In an environment where technology is developing and maturing at an exponential rate, leaders must always be looking ahead – so what does 2018 have in store?

Ronald Ravel.
Ronald Ravel.

Undoubtedly, one of the key dates for next year is the deadline for General Data Protection Regulation (GDPR) compliance which comes into effect on 25 May 2018. It’s important for South African businesses which conduct business in the EU to understand exactly how they will be affected. According to the legislation, any company which processes the personal data of EU residents in connection with the offering of goods or services, or monitors the behaviour of those residents, may need to comply.

To complicate matters, South African companies also need to comply with the Protection of Personal Information Act (PoPI). Fortunately, the provisions across the two pieces of data protection legislation are so similar that complying with the GDPR means complying with PoPI should be smooth sailing.

Yet, faced with the risks of penalties and even legal action, worryingly many are underprepared with over 50% of companies expected to not be in full compliance before the end of 2018. Never has it been more important for organisations to identify ways to best manage their data.

In addition, organisations will continue to be faced with an exponential growth in cybercrime. Ransomware damages alone were expected to rise fifteen times from 2015, hitting $5bn globally this year. Simultaneously, technology is fuelling a transition towards mobile and remote working, ushering in a new era of productivity, and bringing with it new security challenges.

To address the increasingly complex regulatory environment, the growth in cybercrime, and adoption of mobile working practices, we expect to see a growth in the acceptance and education of some specific technology trends. These include: quantum cryptography, Edge Computing, and cloud-based virtual desktop infrastructures.

Quantum cryptography

The basic building blocks of computing are set to morph from maths to physics in the future with the introduction of quantum computing. Global industry analysts forecast its global market to reach $2 billion by 2024, a growth which is primarily driven by a constant need for the most secure online data transmission possible. From this, quantum cryptography is emerging as a highly-evolved protection method, necessary to combat ever-increasing security threats. This method can produce a message unreadable to all except its specific, intended recipient, called quantum key distribution (QKD), whereby ‘keys’ are distributed as photons, usually light rays, which if intercepted, will immediately change state rendering itself unreadable.

Recently, Toshiba made a breakthrough with quantum cryptography at its Cambridge Research Laboratory by creating the world’s fastest QKD device. Attaining a speed of 3.7 Mbps per second – roughly seven times faster than Toshiba’s previous record speed of 1.9 Mbps – this breakthrough brings the practical utilisation of quantum technology one step closer to the wider global community.

Edge computing

With data proliferation coming from the rise of IoT and the predicted capabilities of 5G in 2018, edge computing will become ever more vital. For organisations that handle large amounts of data, deciphering what to send to the cloud can reduce backlogs, allowing it to perform the heavier tasks while edge computing technology allows increased mobility and real-time processing, thus increasing efficiency at both ends of an organisation’s IT chain.

Wearables, such as smart glasses, will work in harmony with edge computing, helping to both streamline processes within organisations in ever more remote or mobile environments. Take the NHS in the UK for example, utilising a wide variety of end-point devices such as smart glasses to access locally stored data, healthcare providers

can collect and analyse patient data from the edge in real time while interacting with patients. This will enable healthcare providers to dramatically increase their efficiency when consulting with patients, while more data can be sent to the cloud for further diagnosis.

Mobile zero clients

As organisations adopt more mobile and flexible working practices, security needs to be the number one priority to successfully embrace the benefits of mobility without falling victim to the increased threat of cybercrime. Organisations have already seen the benefits of thin client solutions, however, because of cost and limitations that restrict remote working, more will move towards zero client solutions which completely remove storage from devices, using external servers to drive operating systems with data access through a cloud-based virtual desktop infrastructure (VDI). By using zero client solutions data is protected against malware and security issues should a device be lost or stolen.

Whether preparing for regulatory change, protecting against the ever-expanding cyber threat landscape, or addressing trends like mobile working, 2018 will be a year of digital transformation and learning for many organisations. While technology such as quantum cryptography is still evolving, it is already offering equal opportunities for cryptographers and hackers, so organisations need to start considering how it will impact them now.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
Crypto in SA: between progress and precaution
Information Security
“As cryptocurrency gains momentum and legitimacy, it’s becoming increasingly important for people to pay attention to financial security”, says Richard Frost, head of technology and innovation at Armata Cyber Security.

Read more...
Cyber recovery requires a different approach to disaster recovery
Information Security
Disaster recovery is about getting operations back on track after unexpected disruptions; cyber recovery, however, is about calculated actions by bad actors aiming to disrupt your business, steal sensitive data, or hold your system hostage.

Read more...
MDR users claim 97,5% less
Sophos Information Security
The average cyber insurance claim following a significant cyberattack is just $75 000 for MDR users, compared with $3 million for endpoint-only users, according to a new independent study.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Kaspersky KATA 7.0 for targeted attack protection
Information Security Products & Solutions
] Kaspersky has announced a major update to its Kaspersky Anti Targeted Attack (KATA) including enhanced network detection and response (NDR) capabilities with deeper network visibility, internal threats detection and other critical security features.

Read more...
The role of advanced technologies in ransomware recovery
Information Security
As businesses increasingly adopt cloud technologies, the complexities of maintaining resilience and ensuring rapid recovery from such incidents become even more pronounced. The integration of advanced technologies is essential to navigate these challenges effectively.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...