Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Has to Be a Priority in 2020

Security Has to Be a Priority in 2020

Cybercriminals aren’t exactly holding back when it comes to attacking businesses, which means that businesses can’t rest on their haunches as the new year rolls in. Let’s take a few moments to look toward the near future, and the issues that cybersecurity professionals are warning us about.

Misconfigured Cloud Environments

There is no question that cloud-based solutions deliver considerable benefits to businesses, and as a result, there has been considerable growth in the adoption of these cloud solutions. However, this growth isn’t necessarily all that it’s cracked up to be, as it has led to a steep divide between the adoption of these solutions, and the skills needed to sustain these infrastructures and the security needed to protect them.

Gartner has given credit for a full 95 percent of public cloud security failures to - not the providers of the platform - but the customers using these public cloud platforms. 2019 alone has seen more than its fair share of security issues due to misconfigured cloud solutions, such as the now-infamous Capital One breach.

If these trends continue, it is clear that 2020 will see many of these issues exacerbate.

Compliance Fatigue

Among the widespread threats to cybersecurity, one of the biggest issues has predictably been the understandable wearing down of businesses in the face of so many regulations and other measures that are dictated to them - often contradicting one another. The requirements are so numerous, with so few actions directed toward the enforcement of them, it is little wonder that businesses let certain requirements slide.

This is dangerous, and the regulations that businesses need to abide by are in place for the mutual benefit of a business and its clientele. If a business fails to meet these standards, it is putting the welfare of its clients and of its own operations in jeopardy.

Exacerbating this problem further, some businesses could be subject to multiple regulations and compliances at once, with the potential for these regulations and compliance requirements to restrict the effectiveness of the others, or even negate them. As a final result, it only becomes more likely that, in response to these ever-increasing demands, some businesses may neglect their cybersecurity, falling to oversights and omissions.

Phishing Attacks

Regardless of how much cybersecurity solutions improve, there is one weakness that can’t just be patched: the human nature of the user. Whether we’re referring to one of your employees, or yes, you yourself, many times the least secure aspect of any of your business computing is the person sitting at the workstation. After all, it is much easier to manipulate a human being than it is to trick a computer… a trend that isn’t likely to change in 2020, and not for many years after that.

This means that one of your most worthwhile investments into cybersecurity will actually be the time you and your employees spend learning how to spot impending scams and mitigate them before they cause any trouble.

Mobile Malware

Considering how much our reliance on our mobile devices has increased, it should come as no surprise that malware that targets mobile devices has become more popular as well - and we’re talking a lot more popular. Throughout 2018, Kaspersky Lab observed a significant increase in malware attacks that targeted banking applications - during that year alone, the number of malware files used jumped from 18,501 to 29,841. This just goes to show that cybercriminals are focusing their efforts where they are more likely to be effective.

Voyage Technology is here to help businesses like yours handle their technology, part of which means assisting in keeping it secure. To learn more about what you need to do in the new year to protect your operations, reach out to us today by calling 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 31 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Phishing Email Computer Google Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft Passwords Quick Tips AI Saving Money Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Holiday Facebook Automation Miscellaneous Artificial Intelligence Covid-19 Cloud Computing Training Gadgets Compliance Server Remote Work Managed Service Provider Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Vendor Mobile Office Two-factor Authentication Managed Services Apps Apple Networking App BYOD Mobile Device Management Gmail WiFi Tip of the week Voice over Internet Protocol Chrome Budget Employer-Employee Relationship Managed IT Services How To Hacker BDR Avoiding Downtime HIPAA Marketing Applications Computing Physical Security Information Technology Access Control Office 365 Conferencing Computers Router Website Operating System Virtual Private Network Risk Management 2FA Help Desk Health Analytics Office Tips Big Data Augmented Reality Healthcare Retail Storage Password Bring Your Own Device Windows 7 Customer Service Microsoft 365 Solutions Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Cybercrime Firewall Windows 11 Display Monitoring Printer Paperless Office Infrastructure Excel The Internet of Things Remote Workers Managed IT Service Social Document Management Telephone Cooperation Free Resource Scam Data loss Project Management Images 101 Administration Hacking Telephone System Multi-Factor Authentication Mobility Presentation Cost Management Wireless Technology Robot Employees Settings Wireless Integration Printing Content Filtering Word IT Management User Tip Modem Mobile Security VPN Processor YouTube Meetings Cryptocurrency Holidays Data Storage Computer Repair Smart Technology Supply Chain Safety Virtual Desktop Video Conferencing LiFi Managed Services Provider Data storage Saving Time Virtual Machines Professional Services Outlook Machine Learning Money Humor Downloads iPhone Licensing Maintenance Vulnerabilities Customer Relationship Management Antivirus Entertainment Sports Data Privacy Mouse Microsoft Excel IT Maintenance Mobile Computing Data Analysis Star Wars IT Assessment Tablet Gamification Flexibility Search Staff Value Business Intelligence Best Practice Organization Alert Social Networking Legislation Shortcuts Dark Data Ransmoware User Managed IT Fileless Malware Digital Security Cameras Buisness File Sharing Smart Devices IT solutions Content Remote Working How To Wearable Technology Memory Vendors Legal Business Growth Health IT Notifications Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce IP Address Directions Videos Travel Assessment Electronic Health Records Google Maps Cortana Wasting Time Threats Techology Alt Codes Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Recovery Microchip Downtime Unified Threat Management Internet Exlporer Software as a Service Hosted Solution Username Managing Costs Amazon Hard Drives Unified Threat Management Domains Typing eCommerce Black Friday SSID Network Congestion Virtual Assistant Outsource IT Database Surveillance Knowledge IT Technicians Virtual Machine Environment Media Refrigeration Google Drive User Error Public Speaking Proxy Server Reviews Cookies Cyber Monday Medical IT 5G Hotspot Transportation Small Businesses Lithium-ion battery Point of Sale Tactics Development Entrepreneur Unified Communications Experience Mirgation Hypervisor Displays Google Docs Bitcoin Network Management Shopping Running Cable Tech Support Nanotechnology Optimization PowerPoint Monitors Language Employer/Employee Relationships Outsourcing Google Wallet Addiction Management PCI DSS Chatbots Navigation Undo Windows 8 Gig Economy Laptop Websites Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Drones Service Level Agreement Internet Service Provider Regulations Compliance Electronic Medical Records Identity Evernote Paperless SharePoint Bookmark Halloween Smart Tech Memes Co-managed IT Writing Alerts SQL Server Technology Care Application Lenovo Download Net Neutrality Financial Data Virtual Reality History Business Communications IBM Hacks Server Management Browsers Smartwatch Scary Stories Private Cloud Connectivity IT Break Fix Scams Identity Theft Upload Procurement Fun Azure Hybrid Work Superfish Deep Learning Social Network Telework Twitter Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables CES Error IoT Communitications Education Trends Supply Chain Management Social Engineering Customer Resource management FinTech Remote Computing Regulations Google Calendar Term Google Apps Competition

Blog Archive