Contact us today!

FRS Pros Blog

What We Can Learn from Some Foreboding Security Predictions

What We Can Learn from Some Foreboding Security Predictions

With the COVID-19 crisis far from over, many businesses have had their attention pulled away from their cybersecurity needs by the concerns that the current health crisis has generated. Here, we’ll be reviewing some of the observations that a group of 273 cybersecurity professionals have made, courtesy of an annual survey.

Breaking Down the Numbers

According to the 2020 Black Hat Attendee Survey, these professionals were significantly concerned with potential cyberthreats and infrastructure beaches as the ongoing health crisis continues. Significantly concerned, as in 94 percent of respondents seeing COVID-19 increasing the threats to enterprise systems and their data, 24 percent seeing this threat as “critical” and “imminent.”

A lot of these respondents were concerned with the idea of vulnerabilities in their remote access systems, with 57 percent of them responding in the affirmative. 51 percent were concerned about possible social engineering and phishing attacks.

Adding to the concern, a full 90 percent of these cybersecurity professionals predict that there will be an attack on the critical infrastructure of the United States within the next two years, rising from the 2019 prediction stat of 77 percent and the 2018 stat of 69 percent. In 2019, 21 percent of these professionals thought that there were sufficient preparations in place for government and private industry to handle these attacks. Comparatively, only 16 percent feel the same this year.

Clearly, this does not bode well for businesses, and the current COVID-19 crisis only adds another level of difficulty to their operations. After all, many business owners may disregard one issue in the face of an admittedly much more visible one. Furthermore, with so many now operating remotely, there is the added insecurity that often comes with untrained remote operations.

For instance, many common security concerns are associated with the tools meant to secure precisely this kind of operativity, such as:

  • Passwords were only rated as 25 percent effective
  • Antivirus tools were rated as 31 percent effective
  • Cloud security providers and cloud security tools received less-than-stellar ratings—41 and 46 percent saw them as ineffective.

What’s worse, 70 percent of these cybersecurity experts foresee a major security breach within their own organization within a year, with 59 percent citing insufficient security staffing and 56 percent citing insufficient budgetary resources to protect their operations.

Perhaps most discouraging is the idea that 53 percent of surveyed cybersecurity professionals stated that they felt serious burnout setting in. Considering that 2019’s stats placed this number at 40 percent, this jump is certainly severe.

What Can Be Done?

Based on the results of this survey, it’s clear that there needs to be a paradigm shift within businesses. Not only should cybersecurity be taken more seriously as these businesses go about distributing their available budgets, there also needs to be a greater awareness of the importance of cybersecurity on every level. Take, for instance, the importance of cybersecurity measures and how half of today’s available tools had such poor efficacy ratings. When passwords were only rated as effective by 25 percent, but multifactor authentication (84 percent), encryption (74 percent), and endpoint security (63 percent) saw much higher efficacy ratings, it seems pretty clear that the overall technology strategy that many businesses utilize needs to shift in the near future.

FRS Pros can help in this regard, as our team can assist your business in implementing and utilizing these improved cybersecurity measures—even now. To learn more about how you can protect your business from cybercrime through strategic technology and improved user training, reach out to us at 561-795-2000.

When It Comes to Your Technology Policies, Don’t F...
Let’s Help You Understand PCI Compliance

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!


Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Business Computing Network Security Privacy Internet Hackers User Tips Software Cloud Efficiency Microsoft Google Hardware Innovation Data Business Management Hosted Solutions Email Computer Communication Windows 10 Cybersecurity Tech Term Smartphones Malware IT Services IT Support Business Mobile Devices Small Business Data Backup Workplace Tips Android Disaster Recovery Backup Office 365 Data Recovery Upgrade Browser Outsourced IT Smartphone Collaboration VoIP Internet of Things Gadgets Windows Apps Phishing Users Communications Cloud Computing Business Continuity Data Security Information Ransomware Cybercrime Saving Money Network Managed IT Services Automation Facebook Microsoft Office Operating System Managed Service Passwords Miscellaneous Mobile Device Management Health Vulnerability Employer-Employee Relationship Quick Tips Wireless OneNote Server Money Covid-19 Artificial Intelligence Blockchain Two-factor Authentication Alert Law Enforcement Social Media Applications Holiday Virtualization Chrome Mobile Device IT Support Managed IT Services Best Practice Managed IT Information Technology Mobile Office Networking Spam Windows 10 Gmail Save Money Conferencing Windows 7 Word Router Computers Data Storage Patch Management Google Drive Settings Project Management Bandwidth Data Breach Telephone Systems Tech Support Access Control Managed Service Provider Printing Bring Your Own Device BYOD Unsupported Software Augmented Reality Password App Retail Hacking History Safety Data Loss SaaS Battery Proactive IT Business Technology Hosted Solution Software as a Service Touchscreen Wireless Charging Risk Management Google Docs WiFi Budget Search Hard Drive Display Devices Avoiding Downtime Mobility Wireless Technology Human Resources Wi-Fi Data Management Payment Cards Audit Update Meetings Productivity Going Green Social Shortcut Data Protection Travel Politics Government Paperless Office Excel Management Sports File Sharing BDR Fraud Cost Management Robot Mobile Security Telephony IT Management Vendor Marketing HIPAA Evernote Commerce The Internet of Things Google Assistant WannaCry User Error VPN iPhone Application Hybrid Cloud Cortana Encryption Voice over Internet Protocol Remote Workers Medical IT Consultant Smart Devices Charger Data storage Value Wasting Time Training Benchmarks Policy Ciminal Remote Monitoring Holidays Data Theft Remote Computing Data Privacy Micrsosoft Audits Device Security Amazon Downtime Legislation Language Instant Messaging Hacker IT solutions Investment DDoS Net Neutrality Adobe Workers Gamification Keyboard Shortcuts Managed IT Service Files Emergency 5G Sabotage Recovery Troubleshooting Accessory Myths Disaster Procedure Copiers Gifts Computing Point of Sale iOS Business Intelligence WIndows Server 2008 Solutions Windows Ink Virtual Assistant E-Commerce Managed Services Provider Comparison Transportation Keyboard Testing Windows 10s ROI HBO Internet Service Provider Licensing Updates Laptop Entertainment Memory Private Cloud YouTube PC Screen Mirroring CRM Administrator Outlook Computer Forensics Identity Theft Peripheral Computer Care Nanotechnology Threats Video Conferencing Microsoft Excel IT budget Unified Threat Management Inventory Streaming Media Credit Cards App store Chromebook Office Co-Managed Services Lithium-ion battery Digital Signage Printer Google Maps Spyware Alexa for Business Facebook Privacy Specifications Virus Camera Solid State Drive Windows Server 2008 R2 Microsoft Word Touchpad Financial Payroll Employees Emails Cast AI Access Vendor Management Root Cause Analysis Scams Organization Employee Upgrades Chromecast Scam Telephone Computer Fan Firewall PCI DSS Apple eCommerce Sales Proactive Education Projects Hard Disk Drive Workstation Tablets Maintenance Humor Security Cameras Storage Social Engineering OneDrive Smartwatch Internet Exlporer Sync PowerPoint Samsung Admin Virtual Private Network Personal Information Compliance Break/Fix Hosted Desktop FAQ Hyperlink Processor Regulations Compliance Edge Fiber Optics Websites Identity Printers Development Uninterrupted Power Supply IT Solutions Telework NFL eWaste Legal Machine Learning Identities Reputation Employee-Employer Relationship Webinar Server Maintenance Remote Work Antivirus Wireless Internet Saving Time Mobile Computing Regulation Computer Accessories Monitors Smart Technology Flexibility Music Text Messaging Television CrashOverride Twitter Company Culture Scalability Analytics Office tips Black Market Cleaning Advertising Automobile Big Data Managing Stress Thank You USB Worker es Books Communitications End of Support HaaS How To Relocation Hiring/Firing Congratulations Video Games Experience Virtual Reality Work/Life Balance Current Events Electronic Medical Records Crowdsourcing Employer Employee Relationship Cache Benefits Phone System Save Time PDF