SlideShare a Scribd company logo
1 of 16
THE TOP FIVE CYBERSECURITY
TRENDS IN 2023
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
THE TOP FIVE CYBERSECURITY TRENDS IN 2023
Cybersecurity is a fast-evolving area. Here, we look at the most important
trends to watch out for in 2023, including the increased threats from
connected IoT devices, hybrid working, and state-sponsored attacks.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
In recent years we have seen the topic of cyber security move from the IT department to the
board room. As attacks have proliferated and the potential penalties, both regulatory and in
terms of loss of customer trust, have increased, it has become a priority at every organizational
level.
We often think of cybersecurity as an ongoing battle between hackers and criminals, and security
experts, which is constantly escalating due to constant advances in technology. This is the
“glamorous” side of the business that we sometimes see depicted in TV shows and movies. And
indeed, threats sometimes come from hostile foreign states or devious, tech-savvy criminal
masterminds. In reality, however, threats are just as likely to emerge due to improperly secured
networks leaving sensitive data accidentally exposed, or unwary or indiscreet employees using
non-secured devices while working from home.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
A shift to a culture of home and remote working that started during the Covid-19
pandemic and has persisted in many organizations, as well as the spread of the internet
of things (IoT) into every area of business and society, means there has never been more
opportunity for lax security to cause headaches and expense. Because of this,
cybersecurity is top of everyone’s agenda in 2023, so here’s a look at some of the key
trends in 2023:
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
INTERNET OF THINGS AND CLOUD SECURITY
The more devices we connect together and network, the more potential doors and windows exist that
attackers can use to get in and access our data. And in 2023, analysts at Gartner predict, there will be 43
billion IoT-connected devices in the world.
IoT devices – ranging from smart wearables to home appliances, cars, building alarm systems and industrial
machinery – have often proven to be a bugbear for those with responsibility for cybersecurity. This is
because, as they are often not used to store sensitive data directly, manufacturers haven’t always been
focused on keeping them secure with frequent security patches and updates. That has changed recently, as
it’s been shown that even when they don’t store data themselves, attackers can often find ways to use them
as gateways to access other networked devices that might. Today, for example, you’re less likely to find a
device shipped with a default password or PIN that doesn’t require the user to set their own, as was
frequently the case in the past.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
In 2023, a number of governmental initiatives around the world should come into effect
designed to increase security around connected devices, as well as the cloud systems
and networks that tie them all together. This includes a labeling system for IoT devices
set to be rolled out in the US to provide consumers with information on possible security
threats posed by devices they bring into their homes.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
WORK-FROM-HOME CYBERSECURITY BECOMES A
PRIORITY FOR BUSINESSES
Recently, a cybersecurity priority for many organizations has been to secure the millions of
devices worldwide that are being used for home and remote working since the start of the
pandemic. Pre-pandemic, when we were all office-based, it was simple enough for security
agents, probably based in IT departments, to regularly check and update company laptops and
smartphones. This made it relatively simple to ensure they were free of spyware and malware
and were running the latest versions of anti-virus software and other preventative measures. In
2023, when workers are more likely than ever to use personal devices to remotely connect to
work networks, a new set of challenges has emerged.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
Connecting to networks with non-secured devices can lead to employees unwittingly falling
victim to phishing attacks, where attackers trick users into divulging passwords. With more
people working remotely, it’s increasingly likely we may find ourselves working in teams
where we don’t know each other as well and are at risk of falling for impersonation scams. It
also enables ransomware attacks, where software is injected into networks that erase
valuable data unless users pay a ransom to attackers. The risk of this also increases in remote
working situations, where it’s more likely that devices may be left unattended.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
INTERNATIONAL STATE-SPONSORED ATTAKERS TARGET BUSINESSES AS
WELL AS GOVERNMENTS
Nation-states frequently take part in cyber-espionage and sabotage in an attempt to
undermine unfriendly or competing governments or to access secrets. In this day and age,
however, it's increasingly likely that companies and non-governmental organizations (NGOs)
will find themselves targeted by state actors.
Since the 2017 WannaCry ransomware attack, believed to have been perpetrated by hackers
affiliated with the government of North Korea, there have been hundreds of thousands of
attacks on servers all around the world that security agencies believe can be traced to foreign
governments.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
In 2023, more than 70 countries are due to hold governmental elections – events that
are frequently a target for attack by hostile foreign interests. As well as hacking and
cyberattacks on infrastructure, this will take the form of disinformation campaigns on
social media. This often involves seeking to influence the results in favor of political
parties whose victories would benefit the government of the hostile state. And cyber
warfare will undoubtedly continue to form a key element in armed conflict, with one
analyst saying of the Russia-Ukraine war that “Digital is an important a part of this war
as is the fighting on the ground.”
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
ARTIFICIAL INTELLIGENCE (AI) PLAYS AN INCREASINGLY
PROMINENT ROLE IN CYBERSECURITY
As the number of attempted cyberattacks has grown rapidly, it has become
increasingly tricky for human cybersecurity experts to react to them all and predict
where the most dangerous attacks will take place next. This is where AI comes into
play. Machine learning algorithms can examine the vast amount of data moving
across networks in real-time far more effectively than humans ever could and learn
to recognize patterns that indicate a threat. According to IBM, companies that use AI
and automation to detect and respond to data breaches save an average of $3
million compared to those that don’t.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
Unfortunately, thanks to the ever-growing availability of AI, hackers, and criminals are growing
increasingly proficient at using it too. AI algorithms are used to identify systems with weak security or
that are likely to contain valuable data among the millions of computers and networks connected to the
internet. It can also be used to create large numbers of personalized phishing emails designed to trick
receivers into divulging sensitive information and become increasingly good at evading automated email
defense systems designed to filter out this type of mail. AI has even been used to artificially “clone” the
voice of senior executives and then to fraudulently authorize transactions!
This is why the use of AI in cybersecurity is sometimes referred to as an "arms race," as hackers and
security agents race to ensure the newest and most sophisticated algorithms are working on their side
rather than for the opposition. It’s been predicted that by 2030 the market for AI cybersecurity products
will be worth close to $139 billion – a near tenfold increase on the value of the 2021 market.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
BUILDING A SECURITY-AWARE CULTURE
Perhaps the most important step that can be taken at any organization is to ensure that it is working
towards initiating and fostering a culture of awareness around cybersecurity issues. Today, it’s no longer
good enough for employers or employees to simply think of cybersecurity as an issue for the IT
department to take care of. In fact, developing an awareness of the threats and taking basic precautions
to ensure safety should be a fundamental part of everyone’s job description in 2023!
Phishing attacks rely on “social engineering” methods to trick users into divulging valuable information or
installing malware on their devices. No one needs technical skills to learn to become aware of these types
of attacks and to take basic precautions to avoid falling victim. Likewise, basic security skills like the safe
use of passwords and developing an understanding of two-factor authentication (2FA) should be taught
across the board and continually updated. Taking basic precautions like this to foster a culture of
cybersecurity-awareness should be a core element of business strategy at organizations that want to
ensure they build resilience and preparedness over the coming 12 months.
© 2021 Bernard Marr, Bernard Marr & Co. All rights reserved
To stay on top of the latest on new and emerging business and tech trends, make sure to
subscribe to my newsletter, follow me on Twitter, LinkedIn, and YouTube, and check out
my books ‘Tech Trends in Practice’ and ‘Business Trends in Practice, which just won the
2022 Business Book of the Year award.
© 2021 Bernard Marr , Bernard Marr & Co. All rights reserved
Bernard Marr is an internationally best-selling author, popular keynote speaker,
futurist, and a strategic business & technology advisor to governments and
companies. He helps organisations improve their business performance, use data
more intelligently, and understand the implications of new technologies such as
artificial intelligence, big data, blockchains, and the Internet of Things.
LinkedIn has ranked Bernard as one of the world’s top 5 business influencers. He is
a frequent contributor to the World Economic Forum and writes a regular column for
Forbes. Every day Bernard actively engages his 1.5 million social media followers
and shares content that reaches millions of readers.
hello@bernardmarr.com
www.bernardmarr.com

More Related Content

Similar to The Top Five Cybersecurity Trends In 2023

The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfMax Secure Ltd
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internetsuperintendingengine17
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONChristopherTHyatt
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityPixel Crayons
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023K7 Computing Pvt Ltd
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptxIT Company Dubai
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importancemanoharparakh
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfRahimMakhani2
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfMobibizIndia1
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017Accelerate Tech
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfYamuna5
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfMobibizIndia1
 
Top 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityTop 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityHeritageCyberworld
 

Similar to The Top Five Cybersecurity Trends In 2023 (20)

The Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdfThe Role of Technology in Modern Security Services Trends and Innovations.pdf
The Role of Technology in Modern Security Services Trends and Innovations.pdf
 
5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet5G-and-IoT-vs-cyber-security.pdf internet
5G-and-IoT-vs-cyber-security.pdf internet
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Security Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – NetmagicSecurity Threats Predictions in 2015 – Netmagic
Security Threats Predictions in 2015 – Netmagic
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023Top Security Threats to Look Out for in 2023
Top Security Threats to Look Out for in 2023
 
7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx7 Cybersecurity Statistics You Need to Know in 2023.pptx
7 Cybersecurity Statistics You Need to Know in 2023.pptx
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Cybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & ImportanceCybersecurity in BFSI - Top Threats & Importance
Cybersecurity in BFSI - Top Threats & Importance
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdfTop 10 Methods to Prevent Cyber Attacks in 2023.pdf
Top 10 Methods to Prevent Cyber Attacks in 2023.pdf
 
Top 15 security predictions for 2017
Top 15 security predictions for 2017Top 15 security predictions for 2017
Top 15 security predictions for 2017
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 
Top List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdfTop List of Cybersecurity Trends to Implement in 2023.pdf
Top List of Cybersecurity Trends to Implement in 2023.pdf
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
Top 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber securityTop 10 Cyber security Threats | Cyber security
Top 10 Cyber security Threats | Cyber security
 

More from Bernard Marr

The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023Bernard Marr
 
How To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For BusinessHow To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For BusinessBernard Marr
 
The Top 5 Healthcare Trends In 2023
The Top 5 Healthcare Trends In 2023The Top 5 Healthcare Trends In 2023
The Top 5 Healthcare Trends In 2023Bernard Marr
 
The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023Bernard Marr
 
Policing In The Metaverse: What’s Happening Now
Policing In The Metaverse: What’s Happening NowPolicing In The Metaverse: What’s Happening Now
Policing In The Metaverse: What’s Happening NowBernard Marr
 
Banking In The Metaverse – The Next Frontier For Financial Services
Banking In The Metaverse – The Next Frontier For Financial Services Banking In The Metaverse – The Next Frontier For Financial Services
Banking In The Metaverse – The Next Frontier For Financial Services Bernard Marr
 
The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023Bernard Marr
 
Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?Bernard Marr
 
The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023Bernard Marr
 
How To Build A Positive Hybrid And Remote Working Culture In 2023
How To Build A Positive Hybrid And Remote Working Culture In 2023How To Build A Positive Hybrid And Remote Working Culture In 2023
How To Build A Positive Hybrid And Remote Working Culture In 2023Bernard Marr
 
Beyond Dashboards: The Future Of Analytics And Business Intelligence?
Beyond Dashboards: The Future Of Analytics And Business Intelligence? Beyond Dashboards: The Future Of Analytics And Business Intelligence?
Beyond Dashboards: The Future Of Analytics And Business Intelligence? Bernard Marr
 
The Top 5 Data Science And Analytics Trends In 2023
The Top 5 Data Science And Analytics Trends In 2023The Top 5 Data Science And Analytics Trends In 2023
The Top 5 Data Science And Analytics Trends In 2023Bernard Marr
 
The 5 Biggest Business Trends For 2023
The 5 Biggest Business Trends For 2023The 5 Biggest Business Trends For 2023
The 5 Biggest Business Trends For 2023Bernard Marr
 
12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work 12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work Bernard Marr
 
The Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerThe Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerBernard Marr
 
How AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of HealthcareHow AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of HealthcareBernard Marr
 
Top 16 Essential Soft Skills For The Future of Work
Top 16 Essential Soft Skills For The Future of WorkTop 16 Essential Soft Skills For The Future of Work
Top 16 Essential Soft Skills For The Future of WorkBernard Marr
 
Artificial Intelligence And The Future Of Marketing
Artificial Intelligence And The Future Of MarketingArtificial Intelligence And The Future Of Marketing
Artificial Intelligence And The Future Of MarketingBernard Marr
 
Is AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say NoIs AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say NoBernard Marr
 
Will Smart Glasses Replace Smartphones In The Metaverse?
Will Smart Glasses Replace Smartphones In The Metaverse?Will Smart Glasses Replace Smartphones In The Metaverse?
Will Smart Glasses Replace Smartphones In The Metaverse?Bernard Marr
 

More from Bernard Marr (20)

The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023The Top 4 Telecom Trends In 2023
The Top 4 Telecom Trends In 2023
 
How To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For BusinessHow To Use Meta’s Horizon Workrooms For Business
How To Use Meta’s Horizon Workrooms For Business
 
The Top 5 Healthcare Trends In 2023
The Top 5 Healthcare Trends In 2023The Top 5 Healthcare Trends In 2023
The Top 5 Healthcare Trends In 2023
 
The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023The Top 5 In-Demand Tech Skills For Jobs In 2023
The Top 5 In-Demand Tech Skills For Jobs In 2023
 
Policing In The Metaverse: What’s Happening Now
Policing In The Metaverse: What’s Happening NowPolicing In The Metaverse: What’s Happening Now
Policing In The Metaverse: What’s Happening Now
 
Banking In The Metaverse – The Next Frontier For Financial Services
Banking In The Metaverse – The Next Frontier For Financial Services Banking In The Metaverse – The Next Frontier For Financial Services
Banking In The Metaverse – The Next Frontier For Financial Services
 
The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023The 7 Biggest Business Challenges Every Company Is Facing In 2023
The 7 Biggest Business Challenges Every Company Is Facing In 2023
 
Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?Is This The Downfall Of Meta And Social Media As We Know It?
Is This The Downfall Of Meta And Social Media As We Know It?
 
The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023The Top 5 Technology Challenges In 2023
The Top 5 Technology Challenges In 2023
 
How To Build A Positive Hybrid And Remote Working Culture In 2023
How To Build A Positive Hybrid And Remote Working Culture In 2023How To Build A Positive Hybrid And Remote Working Culture In 2023
How To Build A Positive Hybrid And Remote Working Culture In 2023
 
Beyond Dashboards: The Future Of Analytics And Business Intelligence?
Beyond Dashboards: The Future Of Analytics And Business Intelligence? Beyond Dashboards: The Future Of Analytics And Business Intelligence?
Beyond Dashboards: The Future Of Analytics And Business Intelligence?
 
The Top 5 Data Science And Analytics Trends In 2023
The Top 5 Data Science And Analytics Trends In 2023The Top 5 Data Science And Analytics Trends In 2023
The Top 5 Data Science And Analytics Trends In 2023
 
The 5 Biggest Business Trends For 2023
The 5 Biggest Business Trends For 2023The 5 Biggest Business Trends For 2023
The 5 Biggest Business Trends For 2023
 
12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work 12 Practical Steps To Handle Change At Work
12 Practical Steps To Handle Change At Work
 
The Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your CareerThe Top 12 Virtual Networking Tips To Boost Your Career
The Top 12 Virtual Networking Tips To Boost Your Career
 
How AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of HealthcareHow AI And Machine Learning Will Impact The Future Of Healthcare
How AI And Machine Learning Will Impact The Future Of Healthcare
 
Top 16 Essential Soft Skills For The Future of Work
Top 16 Essential Soft Skills For The Future of WorkTop 16 Essential Soft Skills For The Future of Work
Top 16 Essential Soft Skills For The Future of Work
 
Artificial Intelligence And The Future Of Marketing
Artificial Intelligence And The Future Of MarketingArtificial Intelligence And The Future Of Marketing
Artificial Intelligence And The Future Of Marketing
 
Is AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say NoIs AI Really a Job Killer? These Experts Say No
Is AI Really a Job Killer? These Experts Say No
 
Will Smart Glasses Replace Smartphones In The Metaverse?
Will Smart Glasses Replace Smartphones In The Metaverse?Will Smart Glasses Replace Smartphones In The Metaverse?
Will Smart Glasses Replace Smartphones In The Metaverse?
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

The Top Five Cybersecurity Trends In 2023

  • 1. THE TOP FIVE CYBERSECURITY TRENDS IN 2023
  • 2. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved THE TOP FIVE CYBERSECURITY TRENDS IN 2023 Cybersecurity is a fast-evolving area. Here, we look at the most important trends to watch out for in 2023, including the increased threats from connected IoT devices, hybrid working, and state-sponsored attacks.
  • 3. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved In recent years we have seen the topic of cyber security move from the IT department to the board room. As attacks have proliferated and the potential penalties, both regulatory and in terms of loss of customer trust, have increased, it has become a priority at every organizational level. We often think of cybersecurity as an ongoing battle between hackers and criminals, and security experts, which is constantly escalating due to constant advances in technology. This is the “glamorous” side of the business that we sometimes see depicted in TV shows and movies. And indeed, threats sometimes come from hostile foreign states or devious, tech-savvy criminal masterminds. In reality, however, threats are just as likely to emerge due to improperly secured networks leaving sensitive data accidentally exposed, or unwary or indiscreet employees using non-secured devices while working from home.
  • 4. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved A shift to a culture of home and remote working that started during the Covid-19 pandemic and has persisted in many organizations, as well as the spread of the internet of things (IoT) into every area of business and society, means there has never been more opportunity for lax security to cause headaches and expense. Because of this, cybersecurity is top of everyone’s agenda in 2023, so here’s a look at some of the key trends in 2023:
  • 5. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved INTERNET OF THINGS AND CLOUD SECURITY The more devices we connect together and network, the more potential doors and windows exist that attackers can use to get in and access our data. And in 2023, analysts at Gartner predict, there will be 43 billion IoT-connected devices in the world. IoT devices – ranging from smart wearables to home appliances, cars, building alarm systems and industrial machinery – have often proven to be a bugbear for those with responsibility for cybersecurity. This is because, as they are often not used to store sensitive data directly, manufacturers haven’t always been focused on keeping them secure with frequent security patches and updates. That has changed recently, as it’s been shown that even when they don’t store data themselves, attackers can often find ways to use them as gateways to access other networked devices that might. Today, for example, you’re less likely to find a device shipped with a default password or PIN that doesn’t require the user to set their own, as was frequently the case in the past.
  • 6. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved In 2023, a number of governmental initiatives around the world should come into effect designed to increase security around connected devices, as well as the cloud systems and networks that tie them all together. This includes a labeling system for IoT devices set to be rolled out in the US to provide consumers with information on possible security threats posed by devices they bring into their homes.
  • 7. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved WORK-FROM-HOME CYBERSECURITY BECOMES A PRIORITY FOR BUSINESSES Recently, a cybersecurity priority for many organizations has been to secure the millions of devices worldwide that are being used for home and remote working since the start of the pandemic. Pre-pandemic, when we were all office-based, it was simple enough for security agents, probably based in IT departments, to regularly check and update company laptops and smartphones. This made it relatively simple to ensure they were free of spyware and malware and were running the latest versions of anti-virus software and other preventative measures. In 2023, when workers are more likely than ever to use personal devices to remotely connect to work networks, a new set of challenges has emerged.
  • 8. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved Connecting to networks with non-secured devices can lead to employees unwittingly falling victim to phishing attacks, where attackers trick users into divulging passwords. With more people working remotely, it’s increasingly likely we may find ourselves working in teams where we don’t know each other as well and are at risk of falling for impersonation scams. It also enables ransomware attacks, where software is injected into networks that erase valuable data unless users pay a ransom to attackers. The risk of this also increases in remote working situations, where it’s more likely that devices may be left unattended.
  • 9. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved INTERNATIONAL STATE-SPONSORED ATTAKERS TARGET BUSINESSES AS WELL AS GOVERNMENTS Nation-states frequently take part in cyber-espionage and sabotage in an attempt to undermine unfriendly or competing governments or to access secrets. In this day and age, however, it's increasingly likely that companies and non-governmental organizations (NGOs) will find themselves targeted by state actors. Since the 2017 WannaCry ransomware attack, believed to have been perpetrated by hackers affiliated with the government of North Korea, there have been hundreds of thousands of attacks on servers all around the world that security agencies believe can be traced to foreign governments.
  • 10. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved In 2023, more than 70 countries are due to hold governmental elections – events that are frequently a target for attack by hostile foreign interests. As well as hacking and cyberattacks on infrastructure, this will take the form of disinformation campaigns on social media. This often involves seeking to influence the results in favor of political parties whose victories would benefit the government of the hostile state. And cyber warfare will undoubtedly continue to form a key element in armed conflict, with one analyst saying of the Russia-Ukraine war that “Digital is an important a part of this war as is the fighting on the ground.”
  • 11. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved ARTIFICIAL INTELLIGENCE (AI) PLAYS AN INCREASINGLY PROMINENT ROLE IN CYBERSECURITY As the number of attempted cyberattacks has grown rapidly, it has become increasingly tricky for human cybersecurity experts to react to them all and predict where the most dangerous attacks will take place next. This is where AI comes into play. Machine learning algorithms can examine the vast amount of data moving across networks in real-time far more effectively than humans ever could and learn to recognize patterns that indicate a threat. According to IBM, companies that use AI and automation to detect and respond to data breaches save an average of $3 million compared to those that don’t.
  • 12. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved Unfortunately, thanks to the ever-growing availability of AI, hackers, and criminals are growing increasingly proficient at using it too. AI algorithms are used to identify systems with weak security or that are likely to contain valuable data among the millions of computers and networks connected to the internet. It can also be used to create large numbers of personalized phishing emails designed to trick receivers into divulging sensitive information and become increasingly good at evading automated email defense systems designed to filter out this type of mail. AI has even been used to artificially “clone” the voice of senior executives and then to fraudulently authorize transactions! This is why the use of AI in cybersecurity is sometimes referred to as an "arms race," as hackers and security agents race to ensure the newest and most sophisticated algorithms are working on their side rather than for the opposition. It’s been predicted that by 2030 the market for AI cybersecurity products will be worth close to $139 billion – a near tenfold increase on the value of the 2021 market.
  • 13. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved BUILDING A SECURITY-AWARE CULTURE Perhaps the most important step that can be taken at any organization is to ensure that it is working towards initiating and fostering a culture of awareness around cybersecurity issues. Today, it’s no longer good enough for employers or employees to simply think of cybersecurity as an issue for the IT department to take care of. In fact, developing an awareness of the threats and taking basic precautions to ensure safety should be a fundamental part of everyone’s job description in 2023! Phishing attacks rely on “social engineering” methods to trick users into divulging valuable information or installing malware on their devices. No one needs technical skills to learn to become aware of these types of attacks and to take basic precautions to avoid falling victim. Likewise, basic security skills like the safe use of passwords and developing an understanding of two-factor authentication (2FA) should be taught across the board and continually updated. Taking basic precautions like this to foster a culture of cybersecurity-awareness should be a core element of business strategy at organizations that want to ensure they build resilience and preparedness over the coming 12 months.
  • 14. © 2021 Bernard Marr, Bernard Marr & Co. All rights reserved To stay on top of the latest on new and emerging business and tech trends, make sure to subscribe to my newsletter, follow me on Twitter, LinkedIn, and YouTube, and check out my books ‘Tech Trends in Practice’ and ‘Business Trends in Practice, which just won the 2022 Business Book of the Year award.
  • 15. © 2021 Bernard Marr , Bernard Marr & Co. All rights reserved Bernard Marr is an internationally best-selling author, popular keynote speaker, futurist, and a strategic business & technology advisor to governments and companies. He helps organisations improve their business performance, use data more intelligently, and understand the implications of new technologies such as artificial intelligence, big data, blockchains, and the Internet of Things. LinkedIn has ranked Bernard as one of the world’s top 5 business influencers. He is a frequent contributor to the World Economic Forum and writes a regular column for Forbes. Every day Bernard actively engages his 1.5 million social media followers and shares content that reaches millions of readers.