The Cyber Review: Cybersecurity in 2021, build a transformation program

March 6, 2021
Written by Farah


According to the World Economic Forum’s Global Risks Report 2021, cyber risks continue ranking among global risks. The COVID-19 pandemic has exposed cyber vulnerabilities and unpreparedness, as seen by the number of breaches and attacks around the world.

Cybersecurity projections to keep in mind for this year:

  • Threats to the cloud: cloud based security risks such as storage, restricted access, or insecure apps have created a new set of vulnerabilities especially for remote work and online collaboration.
  • Implementation of Artificial Intelligence: AI is an excellent tool that helps cyber specialists mitigate the risks and threats. It helps security teams reduce their time to make important decisions and make faster moves to protect their network and systems.
  • Security procedures can be automated: Many organizations depend on automated processes due to a lack of cyber staff.
  • Threats from Inside: The abuse of personal devices, unprotected networkers, weak passwords, or unauthorized remote access has created problems when the rapid shift to remote work happened last year.
  • Phishing: Remote workers are more vulnerable to phishing attacks than workers in offices where networks and systems are generally very secure. Phishing was one of the top threats faced in security and cyber criminals were using different phishing techniques to target individuals.

2. Essential points to know before implementing a cybersecurity transformation program

Cybersecurity transformation is a process that leads to a rapid reduction of cyber risks while working with new digital technologies. The need for cybersecurity transformation is even more evident now since the pandemic than it was before. There are many points that need to be taken into consideration.

  • Switch from a reactive to proactive approach: Most models are reactive in the sense that they focus on what’s happening in the now. Defenses need to be continuously tested. In addition, the platform should be beyond malware detection.
  • Transformation takes time: There are four phases of cybersecurity transformation, namely planning, mobilization, execution, and transition.

3. 80% of senior IT leaders see cybersecurity protection deficits

A new IDG survey commissioned by Insight Enterprises found that nearly 80% of senior IT and IT security leaders believe their organizations lack sufficient protection against cyberattacks despite increased IT security investments made in 2020 to deal with the various challenges.