{"id":8318,"date":"2020-08-15T04:37:36","date_gmt":"2020-08-15T08:37:36","guid":{"rendered":"https:\/\/bau.edu\/blog\/?post_type=news&#038;p=8318"},"modified":"2025-05-07T15:15:24","modified_gmt":"2025-05-07T19:15:24","slug":"cyber-security-trends","status":"publish","type":"post","link":"https:\/\/bau.edu\/blog\/cyber-security-trends\/","title":{"rendered":"Top Cyber Security Trends: 7 Predictions for 2025"},"content":{"rendered":"<div class=\"f862c97100d898773dd915a3810aee54\" data-index=\"1\" style=\"float: none; margin:0px;\">\n\n<\/div>\n\r\n<p>The <a href=\"https:\/\/bau.edu\/blog\/why-study-cyber-security\/\">cyber security field<\/a> is increasingly important in our lives today.<\/p>\r\n\r\n\r\n\r\n\r\n\r\n<p>Especially since the whole world went into lockdown, everything was moved online; thus, making it more accessible to malware. Whether it is ransomware, AI phishing, or \u201cdeepfakes\u201d that have surfaced recently, a lot of so-called cyber security \u201ctrends\u201d take professionals to solve.<\/p>\r\n\r\n\r\n\r\n<p>So, let\u2019s look into what the future of <a href=\"https:\/\/bau.edu\/blog\/working-in-cyber-security-job-description-and-salary\/\">cyber security<\/a> looks like.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"1-increase-in-interest-in-cloud-computing-security\" class=\"wp-block-heading\">1. Increase in Interest in Cloud Computing Security<\/h2>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\"><img  loading=\"lazy\"  decoding=\"async\"  width=\"937\"  height=\"605\"  class=\"wp-image-8319 pk-lazyload\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  title=\"\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"auto, (max-width: 937px) 100vw, 937px\"  data-pk-src=\"https:\/\/bau.edu\/blog\/\/wp-content\/uploads\/2021\/03\/trends-in-cyber-security.png\"  data-pk-srcset=\"https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/trends-in-cyber-security.png 937w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/trends-in-cyber-security-300x194.png 300w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/trends-in-cyber-security-768x496.png 768w\" ><\/figure>\r\n\r\n\r\n\r\n<p>Cloud computing is by no means new in the <a href=\"https:\/\/bau.edu\/blog\/highest-paying-cyber-security-jobs\/\">cyber security field<\/a>. In fact, it has been underway before the pandemic hit and accelerated onwards. Many businesses needed to hasten digital transformation and security for those working from home, and they did that by using cloud computing.<\/p>\r\n\r\n\r\n\r\n<p>However, cloud computing is not without its faults. Although cloud provides a significant amount of automation, it\u2019s also where a lot of misconfiguration leading to security breaches happen. the most. So, in order to fully leverage this ongoing trend with cloud computing, teams will need to mobilize with new security skills to ensure business continuity.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"2-automation-is-underway-big-time\" class=\"wp-block-heading\">2. Automation Is Underway, Big Time<\/h2>\r\n\r\n\r\n\r\n<p>From farms to accounting, many tedious jobs have been taken on by machines or AI. As easier as our lives become due to the sheer volume and velocity of automation happening around us, there will always be a malicious use of such technological advancement.<\/p>\r\n\r\n\r\n\r\n<p>Many cyber security trends such as \u201c<em>deepfakes<\/em>\u201d and AI phishing can cause significant data breaches, malware infections, and IP theft. This is why continuous efforts to create defenses against AI-fueled attacks are essential to businesses.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"3-ransomware-the-1-threat\" class=\"wp-block-heading\">3. Ransomware, the #1 Threat<\/h2>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\"><img  loading=\"lazy\"  decoding=\"async\"  width=\"1920\"  height=\"1280\"  class=\"wp-image-8322 pk-lazyload\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  title=\"\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"auto, (max-width: 1920px) 100vw, 1920px\"  data-pk-src=\"https:\/\/bau.edu\/blog\/\/wp-content\/uploads\/2021\/03\/emergin-cybersecurity-technologies.jpg\"  data-pk-srcset=\"https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/emergin-cybersecurity-technologies.jpg 1920w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/emergin-cybersecurity-technologies-300x200.jpg 300w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/emergin-cybersecurity-technologies-1024x683.jpg 1024w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/emergin-cybersecurity-technologies-768x512.jpg 768w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/emergin-cybersecurity-technologies-391x260.jpg 391w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/emergin-cybersecurity-technologies-1536x1024.jpg 1536w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/emergin-cybersecurity-technologies-600x400.jpg 600w\" ><\/figure>\r\n\r\n\r\n\r\n<p>Ransomware has been happening since the beginning of the internet and is not necessarily <em>a new cyber security industry trend.<\/em> However, it only recently had a great impact, even when it came to <a href=\"https:\/\/apnews.com\/article\/technology-hacking-europe-cf8f8eee1adcec69bcc864f2c4308c94\" rel=\"nofollow noopener\" target=\"_blank\">human life<\/a>.<\/p>\r\n\r\n\r\n\r\n<p>Although it has been happening for a long time, the predictions for 2021 look grim. According to Cybercrime Magazine, there will be a <a href=\"https:\/\/cybersecurityventures.com\/global-ransomware-damage-costs-predicted-to-reach-20-billion-usd-by-2021\/\" rel=\"nofollow noopener\" target=\"_blank\">ransomware attack every 11 seconds<\/a>. AI-fueled ransomware attacks will continue to cause distress and data breaches throughout the world. However, if security teams are prepared, with threat models, war-games, encryptions, and backups, they will leave a lesser mark.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"4-remote-working\" class=\"wp-block-heading\">4. Remote Working<\/h2>\r\n\r\n\r\n\r\n<p>Remote working is something that was almost an overnight shift in 2020. Just as everyone was going about their business, suddenly we were in lockdown, everything was closing, and all work had moved home.<\/p>\r\n\r\n\r\n\r\n<p>However, this fast shift also means that while everything was moving online in a quick manner, there were lots of opportunities for cyber attacks to go through. Many loopholes and opportunities for such crime were created due to the fast adaptation to cloud services.<\/p>\r\n\r\n\r\n\r\n<p>Professionals have learned the importance of threat modeling, and new <a href=\"https:\/\/bau.edu\/blog\/working-in-cyber-security-job-description-and-salary\/\">cyber security professionals<\/a> will surely learn it when they enter the working space.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"5-rise-in-supply-chain-attacks\" class=\"wp-block-heading\">5. Rise in Supply Chain Attacks<\/h2>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image\"><img  loading=\"lazy\"  decoding=\"async\"  width=\"1920\"  height=\"1281\"  class=\"wp-image-8321 pk-lazyload\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  title=\"\"  data-pk-sizes=\"auto\"  data-ls-sizes=\"auto, (max-width: 1920px) 100vw, 1920px\"  data-pk-src=\"https:\/\/bau.edu\/blog\/\/wp-content\/uploads\/2021\/03\/cyber-security-inudstry-trends.jpg\"  data-pk-srcset=\"https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/cyber-security-inudstry-trends.jpg 1920w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/cyber-security-inudstry-trends-300x200.jpg 300w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/cyber-security-inudstry-trends-1024x683.jpg 1024w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/cyber-security-inudstry-trends-768x512.jpg 768w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/cyber-security-inudstry-trends-391x260.jpg 391w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/cyber-security-inudstry-trends-1536x1025.jpg 1536w, https:\/\/bau.edu\/blog\/wp-content\/uploads\/2021\/03\/cyber-security-inudstry-trends-600x400.jpg 600w\" ><\/figure>\r\n\r\n\r\n\r\n<p>Many cyber threats today are not simple and narrow-minded, and most definitely do not have only one target in mind. A significant number of them target huge companies by going after small suppliers, and as such get past the security easier.<\/p>\r\n\r\n\r\n\r\n<p>A <a href=\"https:\/\/www.carbonblack.com\/resources\/the-ominous-rise-of-island-hopping-counter-incident-response-continues\/\" rel=\"nofollow noopener\" target=\"_blank\">report by VMWare<\/a> shows us that, in fact, 50% of the total number are supply chain attacks. These attackers will either strike immediately and try to move up the ladder or lay still for years while gathering data that could affect millions of people.<br \/><br \/>A new concept that has been generated due to the sheer number of these attacks is <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-zero-trust-architecture\" rel=\"nofollow noopener\" target=\"_blank\">Zero Trust Architecture<\/a>. This refers to a company\u2019s system eliminating the word \u201ctrust\u201d from their infrastructure.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"6-increase-evolution-in-multi-factor-authentication\" class=\"wp-block-heading\">6. Increase &amp; Evolution in Multi-Factor Authentication<\/h2>\r\n\r\n\r\n\r\n<p>Often referred to as the golden standard of security, multi-factor authentication (MFA) is no stranger for any organization. However, the manner in which it is used, oftentimes makes it the least protected one.<\/p>\r\n\r\n\r\n\r\n<p>For instance,<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-urges-users-to-stop-using-phone-based-multi-factor-authentication\/\" rel=\"nofollow noopener\" target=\"_blank\"> Microsoft has urged<\/a> its users to stray away from using phone-based authentication, rather use an app-based one. This, not due to MFA security issues, but because of the nature of the networks today\u2014the message is sent in cleartext and could be intercepted by attackers.<\/p>\r\n\r\n\r\n\r\n<p>However, whatever MFA you have, be sure that it blocks around <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/azure-active-directory-identity\/your-pa-word-doesn-t-matter\/ba-p\/731984\" rel=\"nofollow noopener\" target=\"_blank\">99% of automated attacks<\/a>.<\/p>\r\n\r\n\r\n\r\n<h2 id=\"7-bigger-budgets-allotted-to-cyber-security\" class=\"wp-block-heading\">7. Bigger Budgets Allotted to Cyber Security<\/h2>\r\n\r\n\r\n\r\n<p>For obvious reasons, it is expected of businesses to put more importance on <a href=\"https:\/\/bau.edu\/blog\/what-is-cyber-security-and-ethical-hacking\/\">cyber security<\/a>. However, that\u2019s not all. Companies will be taking huge investments in preventing and dealing with cyber threats and attacks.<br \/><br \/>As of 2012, <a href=\"https:\/\/bau.edu\/blog\/cyber-security-degree-worth-it\/\">cyber\/information security<\/a> was supposed to have a <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" rel=\"nofollow noopener\" target=\"_blank\">37% job growth rate<\/a>, which is much faster than usual. We suspect that, with the new threats the online world has come to face, that number will definitely\u00a0 get higher. This means that the need for cyber security professionals is not going anywhere soon, making it a great choice for prospective students.<br \/><br \/>If you\u2019re someone interested in the <a href=\"https:\/\/bau.edu\/blog\/entry-level-cyber-security-jobs\/\">cyber security field<\/a>, you can access it through BAU\u2019s <a href=\"https:\/\/bau.edu\/program\/msc-in-cyber-security\/\">Master of Science in Cyber Security program<\/a>.<\/p>\r\n\r\n\r\n<p>&nbsp;<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"The cyber security field is increasingly important in our lives today. Especially since the whole world went into lockdown, everything was moved online; thus, making it more accessible to malware.&hellip;\n","protected":false},"author":17,"featured_media":8320,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":{"0":"post-8318","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-information-technology"},"_links":{"self":[{"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/posts\/8318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/comments?post=8318"}],"version-history":[{"count":4,"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/posts\/8318\/revisions"}],"predecessor-version":[{"id":20360,"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/posts\/8318\/revisions\/20360"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/media\/8320"}],"wp:attachment":[{"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/media?parent=8318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/categories?post=8318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bau.edu\/blog\/wp-json\/wp\/v2\/tags?post=8318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}