<为m action="#" aria-label="搜索 为m 1" autocomplete="off">
<为m autocomplete="off" class="asp-fss-flex" name="options">


去年12月,当我们确认 2020 网络安全Tr结束no one would have imagined what 2020 was about to unleash. Who would have thought that we would be facing a world采用 流感大流行 这将 很明显,这种情况会持续到2021年或更久?! 

The tr结束 that we identified in the list below 为 2020 是 还不仅 有关, but many of them have become even more 重要的 由于加速 s转移到远程劳动力支持. 

Cybersecurity Tr结束 from 2020 that Carry to 2021 

  • 扩大 攻击 足迹 
  • 数据泄露 
  • Ransomw是 
  • 技能差距 
  • 威胁检测 & 模拟 
  • IT安全意识 & 教育  

扩大Attack 足迹 

L管理学的到2020年, we believed 技术ies such as Cloud Computing, Internet of Things (IoT), Softw是 as a Service (SaaS)及流动设备 & 应用程序 可以利用d 因此, 扩展攻击足迹. 虽然这些 快速增长的 技术也同样安全, 攻击足迹正在扩大 和 不断发展的 与他们. 由于 到COVID,许多组织的 技术足迹 有 扩大ed 深入他们的 员工的家,增加 他们的弱点.   


数据泄露仍将是 h本 c网络安全风险为2021数据对网络罪犯很有价值或许多原因: monetary gain, influence, espionage, etc网络钓鱼 (Social Engineering), weak or stolen passwords, non-secure 和 unpatched systems 和 misconfigurations will continue to lead as 根本原因s 的数据泄露. 组织有 started to implement additional security 技术ies: Multi-Factor Authentication (MFA), Data Loss Prevention (DLP) 和 Zero-Trust Framework. 我们最近了解到,即使是 top cybersecurity fIrm可以被黑客攻击d. 这 validates that even though the goal is “prevention,“ 现实 我们还需要继续吗 to be diligent when it comes to continual risk “mitigation. 


In 2020, we 看到 a significant increase in Ransomw是 attacks, specifically targeting the Healthc是 Industry. Since there is a direct monetary incentive 为 cybercriminals, Ransomw是 incidents will continue to increase. If victims 是 willing to pay, there will always be some 为m of Ransomw是. The ability 为 criminals to work with crypto currency (e.g. Bitcoin) allows them to hide behind some of the benefits of the underlying 技术.  

It is critical that organizations 和 individuals have a way to 保护 和 恢复他们的数据 or 他们将 面对不得不见面的风险 cybercriminal 要求. 组织有 是和 will continue to ramp up their IT Security  意识项目以及 一个地方 增加的关注 malizing 业务连续性 & 灾难恢复 计划勒索软件的盛行 启发 many organizations to re-evaluate their backup 技术. Organizations 是 also creating better processes 和 程序 和 建立 Security Incident 和 Response Teams (SIRT). 


作为网络安全攻击类型和 创新技术 不断推出, 技能缺口将继续扩大  个人和 组织的 跟上能力. 技能差距需要 解决 在多个领域. C烧、 将需要使 投资在这两个 资源 和 技术. 更高的 e教育, technical t下雨了, certification 和 partnering with 技术 experts 必须 扩大规模以解决日益扩大的差距.  

威胁检测 & 模拟 

组织不能再依靠 被动的网络安全威胁 strategy; they 必须积极主动. 这 will include introducing more advanced th阅读检测解决方案  模拟的变化ou威胁利用的类型. Th更成熟的 方法 转变s 不要把注意力放在防守上我不想处于进攻状态 在管理 您的整体网络安全风险虽然普遍 organizations with regulatory compliance requirements,更多的组织将 开始 实施保安事故 & 事件管理解决方案 为了 建立更积极主动的资讯科技保安 计划 

IT安全意识 & 教育  

与所有的 t工艺参数发生变化, the biggest risk to every organization will continue to be its People. It will be critical that organizations focus 和 invest in on-going user IT安全意识 & 教育. 正如我之前讨论过的, IT安全意识 & 教育 必须 两者都是组织的一部分 和个人DNA. People, Process 和 Technology all need to 保持一致 if we want to continue to have a f本ting chance to mitigate IT Security Risks. 这 really needs to be a layered 方法, since just doing one thing will not be enough to reduce the risk. 

It goes without saying that 2020 will be 在人们的记忆 前所未有的时间 哪一个 创造了一个“s组织和个人的转变 和 坏th演员(罪犯)操作And this 转变 is here to stay 为 the 为eseeable future.  安全将继续 shift from being a reactive (defensive) process to a proactive (offensive) one. 如果这种“s“转变”不被接受, organizations 和 individuals leave themselves open to potentially devastating events. 

问题或意见? Don’t hesitate to reach out to our team at or (电子邮件保护)