200px wide
1300 378 676
+61 7 3120 0640
[email protected]
CONTACT US
CALL US
CONTACT US
  • Corporate Services
    • IT Support Services
      • Managed IT Services Brisbane
      • IT Consulting
      • IT Outsourcing
      • IT Audit & Review
      • Project Services
      • Virtual CIO Services
      • Corporate Apple Services
      • Mobile Device Management
      • IT Support Sydney
      • IT Support Melbourne
      • Brisbane IT Support for Businesses
    • IT Cyber Security Services
      • Managed Security Services
      • ISO 27001 Services & Consulting
      • IT Cyber Security Audits & Assessments
      • Information Security Management
      • RFFR & DESE ISMS Services
      • The Essential Eight Framework
    • Managed Cloud Services
      • Private Cloud
      • Hybrid Cloud
      • Cloud Consulting
      • Microsoft SharePoint
      • Microsoft Office 365
      • Power BI
      • Amazon Web Services
      • Microsoft Azure
      • Colocation & Server Hosting
      • Managed Cloud Backups
      • Microsoft Teams
    • Managed Network Services
      • Managed Internet Services
      • Business Internet
      • Power Apps Development & Consulting
      • Managed Wi-Fi
      • Network Security
      • Managed SD-WAN
      • Private WAN
    • Business Telephony
      • Hosted PBX
      • On-Premise PBX
      • Teams Calling Australia
      • Call Centre Services
    • Hardware and Software Procurement
    • Supported Industries
      • Accountant & Finance IT Support Services
      • Civil & Construction IT Services
      • Creative Industries IT Support Services
      • Law Firm & Legal IT Support Services
      • Not For Profit IT Support Services
      • Healthcare IT Support Services
      • Real Estate IT Support Services
      • Manufacturing IT Support Services
  • Education Services
    • Apple Authorised Reseller
    • Mobile Device Management for Schools
    • Professional Development for Teachers
  • Insights
    • Essential Eight Explained
    • Mastering Microsoft
    • Insights: Cyber Security
    • Insights: Backups
  • About Us
    • Why Choose Us?
    • Client Testimonials
    • Partners and Awards
    • Careers
  • Contact Us

Cyber Security in 2019 and Why We Need to Shift Our Thinking

January 17, 2019 By eStormAdmin

 

2019 is well under way with strategies and projects being approved and budgets being allocated. However, it’s important to take note of the current landscape, where we’re heading in 2019 and how we can improve.

Users & Risk

How people work has evolved over the years. Bring your own device (BYOD) initiatives are becoming more common in the workplace, as well as remote workers seeing a significant increase—one studying showing that 70 percent of professionals work remotely at least one day a week, while 53 percent work remotely for at least half of the week. This means sensitive company data is potentially being exposed to insecure networks and other potential threats.

As a result, we need to shift our thinking toward managing risk based on specific users, user behaviour and the devices being used. Take, for example, two employees attempting to connect to the organisation’s network. The first employee has a trusted work device and is connecting from within the company network. The second is an employee connecting via their home network using a personal mobile device.

In this particular case, the first employee presents far less of a risk and should be granted access easily. However the second user, connecting from their own mobile device from home, might have a multifactor authentication safeguard added to minimise potential risks.

Likewise, we might use this approach to help businesses identify specific users whose roles or activities pose more of a risk. The example Solarwind’s Cybersecurity Predictions uses is the head of human resources who has access to confidential employee data. Someone in this role would require more rigorous security coverage than a graphic designer who might only have access to design files.

You could then require the head of human resources always connect via a VPN in order to guarantee that their device is safe and clean.

Enterprise Approach

Forbes lists industries like healthcare, finance and law as being especially vulnerable to attack, due to their storage and management of large amounts of sensitive data.

While large corporate breaches tend to dominate the headlines, cybercriminals are equal opportunists, which means businesses of all sizes are potential targets. This means smaller organisations should begin to think like larger enterprises and enlist the cybersecurity approaches and strategies they use.

The small to medium sized organisations should be looking to enlist ways to detect and monitor threats in real time, as well as develop strategies to respond in an appropriate and timely manor. Forbes claims small to medium businesses and small enterprises should be considering the large enterprise level approach as larger organisations will begin to demand specific security standards of the businesses they work with.

The Rise of Data Leaks

Breaches caused by a hacker exploiting specific vulnerabilities are far less commonplace. However, people are more often their own worst enemy with a lack of security knowledge, human error or just sheer laziness leaving data exposed far more often than we think.

In 2018, spikes in the number of data leaks and exposures where data was not being protected…at all, not even by a password, saw a significant increase.

Many websites and services in 2018 were exposed for various reasons, many of which resulted from unsecured servers exposing customer records and information— FedEx, Amazon and MindBody.

With data exposures showing no clear sign of slowing down in 2019, it’s now more important than ever to review all aspects of your IT infrastructure to not only fill gaps, but to improve overall security and efficiency.

 

 

Sources:

Brown, T 2019, ‘4 Cybersecurity Predictions for 2019’, Solarwinds MSP Blog, https://www.solarwindsmsp.com/blog/4-cybersecurity-predictions-2019

Browne, R 2018, ‘70% of people globally work remotely at least once a week, study says’, CNBC, https://www.cnbc.com/2018/05/30/70-percent-of-people-globally-work-remotely-at-least-once-a-week-iwg-study.html

NeSmith, B 2018, ‘Cybersecurity Predicitions For 2019’, Forbes, https://www.forbes.com/sites/forbestechcouncil/2018/12/28/cybersecurity-predictions-for-2019/#6e9a2fc44a27

Whittaker, Z 2019, ‘Here’s what to expect in cybersecurity in 2019’, Tech Crunch, https://techcrunch.com/2018/12/31/cybersecurity-predictions-2019/

 

Filed Under: Network Security, News Tagged With: cybersecurity

Unlock Exclusive Bonuses and Promotions at King Johnnie: A Must-Read Review for Australian Players

Ensuring Safe Play: How Slotomania Promotes Responsible Gambling for Australian Users

Discover the Best Slot Games at Dream Vegas Casino for Kiwi Players – Top Picks and Tips!

Tags

amazon Apple apps brisbane lions business network security cloud computing cloud management cloud migration cybercrime cybersecurity education email scam emerging technology facebook Google HomePod hybrid cloud management IT Events IT managed service provider it outsourcing IT services it strategy Microsoft microsoft office 365 Mircosoft password security phishing Phone Solutions remax australia remote work two-factor authentication virtual desktop infrastructure windows workplace productivity

Latest News

  • Unlock Exclusive Bonuses and Promotions at King Johnnie: A Must-Read Review for Australian Players
  • Ensuring Safe Play: How Slotomania Promotes Responsible Gambling for Australian Users
  • Discover the Best Slot Games at Dream Vegas Casino for Kiwi Players – Top Picks and Tips!
  • Discover the Top Benefits of Playing on the QuickWin Mobile Casino App Today!
  • The Rise of Online Gambling in Australia: Exploring Casinonic’s Role in the Evolution

eStorm Australia Head Office

Level 1, 16 Old Cleveland Road
Stones Corner, QLD 4120
P: 1300 378 676
P: +61 7 3120 0640
E: [email protected]

Service Centre Springfield

1/145 Sinnathamby Boulevard,
Springfield Central, QLD, 4300
P: (07) 3180 4228
E: [email protected]

Interstate Contact

Sydney
P: (02) 9188 5148
Melbourne
P: (03) 9088 6431

 

Client Tools

Pay Invoice
Remote Support
Additional Support
Create a Ticket

QAssure - 10805 - eStorm

GITC: Q-4675

NDIS provider

DET QLD preferred
DoE QLD preferred Supplier

Find us on LinkedIn Follow us on Facebook Find us on YouTube

© 2025 eStorm Australia. All Rights Reserved.

Terms of Service | Refund Policy | Privacy Policy | Social Responsibility Policy