Skip to content
Information Age

Information Age

Insight and Analysis for the CTO

  • Subscribe
  • Login
  • facebook
  • x
  • linkedin
  • RSS
  • News
    • IPOs
    • M&A
    • Major Contracts
    • People Moves
    • Releases & Updates
    • Events
  • Data & Insight
    • Case Studies
    • Research
    • Whitepapers
    • Insight Guides
      • Buyers Guides
      • How it Works
      • Business Skills
    • Webinars
  • Sectors
    • Agriculture
    • Automotive
    • Construction & Civil Engineering
    • Consumer Electronics & Mobile
    • Media & Marketing
    • Defence
    • Education
    • Energy & Utilities
    • Financial Services
    • Government & Public Sector
    • Healthcare & Life Sciences
    • Legal & Accountancy
    • Manufacturing
    • Property
    • Retail
    • Technology
      • Payments technology
    • Telecoms
    • Transport & Logistics
  • Topics
    • AI & Machine Learning
      • Generative AI
    • Automation & Robotics
    • Blockchain
    • Business Continuity
    • Business & Strategy
      • CIO and CTO
    • Cloud & Edge Computing
    • Communications & Networking
    • Cybersecurity
      • Cyber Innovation
    • Data Storage & Data Lakes
    • Data Analytics & Data Science
    • Data Protection & Privacy
    • Development & Programming
      • DevOps
    • Digital Transformation
      • Disruptive Innovation
    • Emerging Technology
    • Governance, Risk and Compliance
    • Hardware & Peripherals
    • Immersive Technology
    • IoT and M2M
    • IT management
    • Legislation & Regulation
    • Outsourcing
    • Smart Cities
    • Software and Applications
    • Start-up scene
    • Tech Giants
  • Careers
    • Business Skills
    • Major Contracts
    • Releases & Updates
    • Recruitment
  • Jobs
  • Regions
    • Americas
    • Asia-Pacific
    • EMEA
  • News
    • IPOs
    • M&A
    • Major Contracts
    • People Moves
    • Releases & Updates
    • Events
  • Data & Insight
    • Case Studies
    • Research
    • Whitepapers
    • Insight Guides
      • Buyers Guides
      • How it Works
      • Business Skills
    • Webinars
  • Sectors
    • Agriculture
    • Automotive
    • Construction & Civil Engineering
    • Consumer Electronics & Mobile
    • Media & Marketing
    • Defence
    • Education
    • Energy & Utilities
    • Financial Services
    • Government & Public Sector
    • Healthcare & Life Sciences
    • Legal & Accountancy
    • Manufacturing
    • Property
    • Retail
    • Technology
      • Payments technology
    • Telecoms
    • Transport & Logistics
  • Topics
    • AI & Machine Learning
      • Generative AI
    • Automation & Robotics
    • Blockchain
    • Business Continuity
    • Business & Strategy
      • CIO and CTO
    • Cloud & Edge Computing
    • Communications & Networking
    • Cybersecurity
      • Cyber Innovation
    • Data Storage & Data Lakes
    • Data Analytics & Data Science
    • Data Protection & Privacy
    • Development & Programming
      • DevOps
    • Digital Transformation
      • Disruptive Innovation
    • Emerging Technology
    • Governance, Risk and Compliance
    • Hardware & Peripherals
    • Immersive Technology
    • IoT and M2M
    • IT management
    • Legislation & Regulation
    • Outsourcing
    • Smart Cities
    • Software and Applications
    • Start-up scene
    • Tech Giants
  • Careers
    • Business Skills
    • Major Contracts
    • Releases & Updates
    • Recruitment
  • Jobs
  • Regions
    • Americas
    • Asia-Pacific
    • EMEA
  • Subscribe
  • Login
Home » Topics » Cybersecurity » The biggest post-pandemic cyber security trends

The biggest post-pandemic cyber security trends

by Editor's Choice28 June 2021

It is no secret that the significant changes required of organisations over the past year have come with heightened cyber security risks. Even now, as we begin to move into a ‘new normal’, the landscape is anything but certain. Organisations need to keep up with this evolving threat landscape, as there are several cyber security trends that are emerging from this new post-pandemic era.

Defence against ransomware

Ransomware has been a key adversary for quite some time and there is no sign of this changing. As a result, we expect to see new initiatives released and developed to counteract this threat. There are several initiatives in development because of collaboration between governments, industry associations, businesses and vendors.

The proposed extension to Know Your Customer (KYC) transparency rules in financial transactions is an excellent example of what can come about as an outcome of this collaboration. KYC currently does not include cryptocurrency transactions but attacks against cryptocurrency payments are a favourite of ransomware attackers because they are untraceable. Therefore, extending KYC rules to include cryptocurrency payments is a matter of importance as it will act as a strong deterrent. Collaboration in the development of these initiatives is vital – any organisation that is at risk of becoming the next victim of a ransomware attack will benefit from new initiatives, so it is important that they are supported where possible.

Avoiding ransomware: what security & risk leaders need to know

Barika L Pace, senior director research analyst at Gartner, discusses what security and risk leaders need to know about avoiding ransomware. Read here

Culture of security

Corporate culture often brings to mind ping pong tables, free beers on Fridays and bean bags, but what about security and business continuity planning? Well, they are about to become just as important. Cyber security needs to become front of mind for all employees, not just those who work in IT. One way to do this is through “war-gaming” activities, training employees and creating rapid response plans to ensure that everyone is prepared in case of an attack.

The roles of the C-suite have been changing for quite some time now, as each role becomes less siloed and the whole company is viewed more as a whole than as separate teams. The evolution of the chief information security officer (CISO) is a great example of this – rather than being a separate role to the chief information officer (CIO) or chief technology officer (CTO), the CISO is now responsible for security, customer retention, business continuity planning and much more.

Now, this change needs to spread to the rest of the business so that all employees prioritise security and collaboration, whatever their level and role. The natural result of this is that teams will become more open and better at information sharing which will make it easier to spot when there has been a cyber security issue, as everyone will know what is and isn’t normal across the company.

Security at the edge

The next step of this repositioning of security within the organisation is to acknowledge the impact that working from home has had. At the height of the pandemic, almost all workforces became remote and now, even as companies are gradually starting to return to offices, there will still be a vast network of remote employees.

This rapid and huge shift to remote working at the onset of lockdown restrictions would not have been possible without VPN architectures, but the security governing VPNs is not as strong as it needs to be for the heavy reliance placed on these systems to connect employees to vital applications placed organisations. Organisations have therefore turned to SD-WAN instead. These systems now come with integrated security controls, delivering almost the same level of security to remote workers as the head office. Another more secure option than VPNs that is likely to take an ever more central stage are secure access service edge (SASE) solutions. These combine network and network security into a single cloud service that is both secure and able to provide the level of connectivity needed to run devices at the edge.

How to inspire and empower your remote or hybrid workforce

Four experts explain to Information Age how organisations can inspire and empower your remote or hybrid workforce in the new normal. Read here

The emergence of microsegmentation

A trend that we are likely to see in the near future is that of segmentation and microsegmentation requirements. Accelerated investment in vendor roadmaps will enable more integrated approaches to the requirements of home networks. This will dedicate resources to addressing the segmentation and microsegmentation of all stakeholders in the applications and data that run on personal devices to produce a more integrated method.

Due to the sudden switch to remote working and cloud service adoption, certain principles of cyber security best practice had to be temporarily overlooked for many organisations. However, now that cyber security teams have overcome those earlier challenges in the peak of the crisis, there’s an opportunity to learn from the pandemic to improve cyber security posture long-term.

Written by Sanjay Radia, chief solutions architect at NETSCOUT

Tagged: Cyber Security, Hybrid Workforce, IT Industry Trends

Editor's Choice

Editor's Choice consists of the best articles written by third parties and selected by our editors. You can contact us at timothy.adler at stubbenedge.com More by Editor's Choice

Related Topics

Cyber Security
Hybrid Workforce
IT Industry Trends

Related Stories

Cybersecurity

Building blocks – what’s required for my business to be SECURE?

Here is how to build up your cybersecurity defences, broken down step-by-step, to keep your business safe and secure

Cybersecurity

Bridging the IT and security team divide for effective incident response

Greater alignment between IT and security teams is crucial for effective incident response – here's how to lay down the foundations

Cyber Innovation

Why shutting down systems can backfire during a cyber attack

Despite what instinct might dictate, shutting down your systems during a cyber attack could lead to a slew of negative outcomes

Cybersecurity

Why banning ransomware payments is only a limited fix

JumpCloud's Chief ISO explains how ransomware attacks are still a threat despite proposed legislation and discusses some key defence strategies

Helping you grow your business is our number one priority, if you would like to take your business to the next step just sign up!

sign up now

Related Stories

Cybersecurity

Building blocks – what’s required for my business to be SECURE?

Here is how to build up your cybersecurity defences, broken down step-by-step, to keep your business safe and secure

Cybersecurity

Bridging the IT and security team divide for effective incident response

Greater alignment between IT and security teams is crucial for effective incident response – here's how to lay down the foundations

Cyber Innovation

Why shutting down systems can backfire during a cyber attack

Despite what instinct might dictate, shutting down your systems during a cyber attack could lead to a slew of negative outcomes

Cybersecurity

The risks of supply chain cyberattacks on your organisation

Nick Martindale explores the risks to organisations associated with supply chain cyberattacks and what you should do about it

We provide general intelligence for technologists in the information age. We support CTOs, CIOs and other technology leaders in managing business critical issues both for today and in the future.

Further Information

  • Privacy Policy
  • Terms & Conditions
  • Contact Us
  • About
  • Media Packs
  • Contributor Guidelines

Contact us

  • +44(0) 207 846 1378

Address

  • Stubben Edge
  • 77 Cornhill
  • London
  • EC3V 3QQ