{"id":5784,"date":"2020-11-09T22:25:45","date_gmt":"2020-11-10T05:25:45","guid":{"rendered":"http:\/\/clikcloud.com\/?p=6695"},"modified":"2020-12-09T00:43:24","modified_gmt":"2020-12-09T07:43:24","slug":"trends-in-cybersecurity-in-2020","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/","title":{"rendered":"Trends in Cybersecurity in 2020"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">This extraordinary year, with its rapid shift toward remote work force, has brought about changes in the cybersecurity landscape. With the security perimeter widened by use of devices outside the office, businesses are using the cloud more than before. According to a recent CompTIA research report on the state of cybersecurity, 60% of respondents were taking a more formal approach to risk management and threat intelligence; however, there\u2019s always room for growth. Read on to learn how 2020 events have changed approaches toward cybersecurity.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Acceleration of Cloud Computing<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">One trend in the report is the acceleration of the use of cloud computing. With so many employees working remotely, companies have, at the very least, sent their employees home to work and hurrying to secure day-to-day operations. With this increased use of cloud computing, keeping an eye on the threat landscape is still vital. Cyber attacks have increased, including \u201cphishing,\u201d and are now considered inevitable. The question is how companies will respond.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Cybersecurity the Responsibility of the Entire Organization<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Cybersecurity is no longer merely the responsibility of the IT department. From the newest employee to the board of directors, everyone has a responsibility to help protect data and systems. The executives and board can map out the plan for cybersecurity, beginning with assessing current risks to data and systems. Every employee can be trained in how to handle cyber attacks, and how to prevent them from occurring. Upper management can set the tone, creating a culture of cybersecurity.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Formalization of Cybersecurity Practices<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Along with the increased momentum of cybersecurity adoption, the approach is becoming formalized. According to the CompTIA <\/span><a href=\"https:\/\/www.comptia.org\/content\/research\/cybersecurity-trends-research\"><span style=\"font-weight: 400;\">survey<\/span><\/a><span style=\"font-weight: 400;\">, the majority of companies have taken a more formal approach toward cybersecurity, adopting metrics to measure how well they\u2019re doing. The process starts with risk assessment and management by directors and executives. What security pitfalls might come with remote work? How secure are a company\u2019s data and systems? Formalization of practices also includes measuring and monitoring security efforts that are tied to business objectives. Such metrics might include how many systems have current operating systems, or what percent of employees have been trained in avoiding phishing schemes.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">While some aspects of cybersecurity (like an ever-evolving threat landscape) are the same, many businesses are changing their approach to cybersecurity. For help in evaluating your company\u2019s approach, contact us today.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This extraordinary year, with its rapid shift toward remote work force, has brought about changes in the cybersecurity landscape. With the security perimeter widened by use of devices outside the office, businesses are using the cloud more than before.<\/p>\n","protected":false},"author":1,"featured_media":5792,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[5,100],"tags":[118],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Trends in Cybersecurity in 2020<\/title>\n<meta name=\"description\" content=\"This extraordinary year, with its rapid shift toward remote work force, has brought about changes in the cybersecurity landscape. With the security perimeter widened by use of devices outside the office, businesses are using the cloud more than before.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/\",\"name\":\"Trends in Cybersecurity in 2020\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2020-11-10T05:25:45+00:00\",\"dateModified\":\"2020-12-09T07:43:24+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"This extraordinary year, with its rapid shift toward remote work force, has brought about changes in the cybersecurity landscape. With the security perimeter widened by use of devices outside the office, businesses are using the cloud more than before.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trends in Cybersecurity in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trends in Cybersecurity in 2020","description":"This extraordinary year, with its rapid shift toward remote work force, has brought about changes in the cybersecurity landscape. With the security perimeter widened by use of devices outside the office, businesses are using the cloud more than before.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/","url":"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/","name":"Trends in Cybersecurity in 2020","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2020-11-10T05:25:45+00:00","dateModified":"2020-12-09T07:43:24+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"This extraordinary year, with its rapid shift toward remote work force, has brought about changes in the cybersecurity landscape. With the security perimeter widened by use of devices outside the office, businesses are using the cloud more than before.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/trends-in-cybersecurity-in-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"Trends in Cybersecurity in 2020"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5784"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=5784"}],"version-history":[{"count":1,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5784\/revisions"}],"predecessor-version":[{"id":5785,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5784\/revisions\/5785"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media\/5792"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=5784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=5784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=5784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}