Forcepoint: Traditional security controls are becoming ineffective

2018 will see individuals and governments debate privacy

Tags: Cyber crime
  • E-Mail
Forcepoint: Traditional security controls are becoming ineffective Forcepoint's predicts that privacy will stir debate in 2018.
By  Aasha Bodhani Published  November 21, 2017

2017 saw numerous cyber-attacks take place and it appears 2018 will most likely follow suit. Security firm Forcepoint has launched its 2018 Security Predictions Report outlining possible threats organisations may face.

Forcepoint believes the security industry has been focusing on the wrong solutions, as traditional security perimeters are becoming obsolete. Instead organisations should concentrate on when and why people interact with critical data. Such data continues to move to the cloud and as malware continues to evolve, traditional security controls are becoming ineffective.

Forcepoint's predicts that privacy will stir debate in 2018, as there is already tension between individual rights and security. This year saw the Equifax breach and Forcepoint believes breaches on hosted business applications will continue to occur.  

Additionally, as cryptocurrencies grow in importance, cybercrime will follow as attackers will target vulnerabilities in systems which implement Blockchain technology. Another prediction is with the wide scale of IoT adoption in both consumer and business environments, the monitors are often easy to access. However Forcepoint points out that instead of hackers requesting ransom they will cause mass disruption.

Dr. Richard Ford, chief scientist at Forcepoint, said: "We know that data leakage and ransomware will continue to be the focus for remediation and prevention, but behaviour-centric risks are now behind a multitude of security incidents.

"People's behaviour should not be set in opposition to security: the two are not mutually exclusive. Users have the potential to unintentionally compromise their own systems in one minute and be the source of innovation in the next, but we can only empower users if we truly understand the ways they interact with critical business data."

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code