{"id":11707,"date":"2020-09-21T00:30:08","date_gmt":"2020-09-21T05:30:08","guid":{"rendered":"http:\/\/45.33.92.219\/?p=11707"},"modified":"2020-09-21T00:30:08","modified_gmt":"2020-09-21T05:30:08","slug":"the-future-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/","title":{"rendered":"The Future of Cybersecurity"},"content":{"rendered":"<h2>The Future of Cybersecurity<\/h2>\n<p>With an increase in &#8220;Remote Workers&#8221; expected to continue to rise so are Cyber-attacks which have increased over 2019 exponentially. Phishing, Ransomware, DDoS, and password-based attack vectors are all in play significantly. Joining the top tier are compromised business emails and IoT and AI-based attacks.<\/p>\n<p>We already knew that attacks on businesses are trending up compared to attacks on individual consumers, so the first additions should not surprise anyone. As for the latter two, both areas continue to rapidly grow with 5G expansion. As the IoT grows and AI development expands, so do correlated cyber threats. Escalation is constant in cybersecurity, and you should approach it accordingly.<\/p>\n<p><a href=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/08\/cy.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-11735 aligncenter\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/08\/cy.jpg\" alt=\"\" width=\"1024\" height=\"725\" \/><\/a><\/p>\n<p>Here are some top ways to maintain and improve cybersecurity in your life:<\/p>\n<h4>1. Multifactor Authentication<\/h4>\n<p>Hopefully, you already use two-factor authentication for most secure logins. It takes few seconds of your day and packs a heavy security punch. You are already used to it! For those with access to sensitive business and client information, multifactor authentication is a simple way to add extra protection.<\/p>\n<h4>2. Education<\/h4>\n<p>You cannot protect your data or devices if you do not understand the threats. It takes only one weakness to break a company\u2019s password. With business email compromise expected to rise, can you confidently say that every person in your organization follows the bare minimum in security practices? What about three months from now? They need cybersecurity training, and not just during new employee onboarding. Make it regular, make it thorough, and make sure your team pays attention.<\/p>\n<h4>3. Prevention Over Containment<\/h4>\n<p>The current norm in the cybersecurity industry is containment. When prevention efforts can save more than a million dollars per attack, why on earth would three-quarters of cybersecurity professionals focus on containment instead? Because it\u2019s more accountable. Prevention is too hard and does not give you exact numbers to be dropped into a report to the board.<\/p>\n<p>Audit your network and website for weak points so you have an idea of your attack surface, make patch management a priority, put resources into a cybersecurity team that can supervise and enforce employee security protocols. Prevention efforts can save a business over a million dollars per attack. Keep in mind how common attacks are, 2019 averaged 2,244 attacks each day.<\/p>\n<p>Covid-19 created a hacker\u2019s paradise. Cyber fraud jumped to 20% just in the 1<sup>st<\/sup> quarter of 2020. Then Coronavirus email scams said, \u201cHold my facemask,\u201d as spear-phishing attacks skyrocketed 667% from March 1st through the 23<sup>rd<\/sup>.<\/p>\n<h4>4. Default Security Settings<\/h4>\n<p>If it is connected to the Internet, it is hackable. If we have not scared you enough, Google \u201cbaby monitor hacked.\u201d How many of your smart devices have you actively checked and updated the security settings? Factory default settings are rarely strong.<\/p>\n<h4>5. Strong Passwords<\/h4>\n<p>If it is connected to the Internet, it is hackable. If we have not scared you enough, Google \u201cbaby monitor hacked.\u201d How many of your smart devices have you actively checked and updated the security settings? Factory default settings are rarely strong.<\/p>\n<h4>6. Web Cautions<\/h4>\n<p>You should take some general precautions when browsing the Web, including the following:<\/p>\n<ol>\n<li><strong>Avoid unsecured sites<\/strong>. If you don\u2019t see a closed padlock on the far left of the URL bar, then get out. You need to secure your website.<\/li>\n<li><strong>Don\u2019t click suspicious links<\/strong> or download attachments from unknown email addresses. Don\u2019t trust the name in your inbox, check the address.<\/li>\n<li><strong>Limit the percentage of personal information you share<\/strong>. It is stored, and it will be used against you. Even if you delete your Facebook account, your data will remain on their servers.<\/li>\n<li><strong>Use a VPN!<\/strong> A VPN makes a private network from a public Internet connection. Consider it your seatbelt for the Internet car. As in, it\u2019s not the only safety feature you should have, but it\u2019s one of the most important. To close out, let&#8217;s look again at the DNC hack.<\/li>\n<\/ol>\n<p>We all know the rest of the story. Once the stolen files were shared and published online, containment was out the window in terms of saving face. How many of the basic cybersecurity protection practices outlined above could have mitigated the hack&#8217;s effect? The abundant lack of communication, patch management, and basic cyber threat awareness makes the DNC system incredibly vulnerable.<\/p>\n<p>Adding basic cybersecurity techniques to your routine is easy. Coming back from an international incident of cybercrime isn&#8217;t. Your data might not be as blockbuster as a Presidential candidate&#8217;s in an election year, but it&#8217;s still valuable to hackers. Work hard to protect it.<\/p>\n<p>Clarity is proud to have been providing Network Security Services and Firewall Systems to the Americas for many years including clients Worldwide offering our unified communications platform. Clarity Technologies Group, LLC surpasses expectations!<\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:240}\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9326\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg\" alt=\"\" width=\"300\" height=\"116\" \/><img decoding=\"async\" class=\"alignnone wp-image-9425\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/PNG-275x300.png\" alt=\"\" width=\"125\" height=\"136\" \/>\u00a0<\/span><\/p>\n<p>Call Clarity at 800-354-4160 today or email us at <a href=\"mailto:info@clarityscg.com\">info@clarityscg.com<\/a>. We are partnered internationally around the globe and we are open seven days a week 8:30 AM to 5:00 PM EST\/EDT. <a href=\"http:\/\/45.33.92.219\">http:\/\/45.33.92.219<\/a> and <a href=\"https:\/\/dotmantech.com\">https:\/\/dotmantech.com<\/a>.<\/p>\n<p>[mc4wp_form id=&#8221;314&#8243;]<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Future of Cybersecurity With an increase in &#8220;Remote Workers&#8221; expected to continue to rise so are Cyber-attacks which have increased over 2019 exponentially. Phishing, Ransomware, DDoS, and password-based attack vectors are all in play significantly. Joining the top tier are compromised business emails and IoT and AI-based attacks. We already knew that attacks on [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[95,132],"tags":[94,96,97,98,99,100,101],"class_list":["post-11707","post","type-post","status-publish","format-standard","hentry","category-cyber-security","category-security-services","tag-ceh","tag-cybersecurity","tag-firewall","tag-hardware-firewall","tag-intrusion-detection","tag-penetration-testing","tag-vulnerability-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Future of Cybersecurity -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Future of Cybersecurity -\" \/>\n<meta property=\"og:description\" content=\"The Future of Cybersecurity With an increase in &#8220;Remote Workers&#8221; expected to continue to rise so are Cyber-attacks which have increased over 2019 exponentially. Phishing, Ransomware, DDoS, and password-based attack vectors are all in play significantly. Joining the top tier are compromised business emails and IoT and AI-based attacks. We already knew that attacks on [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-21T05:30:08+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/08\/cy.jpg\" \/>\n<meta name=\"author\" content=\"Bruce Kreeger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruce Kreeger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/\"},\"author\":{\"name\":\"Bruce Kreeger\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\"},\"headline\":\"The Future of Cybersecurity\",\"datePublished\":\"2020-09-21T05:30:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/\"},\"wordCount\":837,\"image\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cy.jpg\",\"keywords\":[\"CEH\",\"cybersecurity\",\"Firewall\",\"Hardware Firewall\",\"Intrusion detection\",\"Penetration Testing\",\"Vulnerability detection.\"],\"articleSection\":[\"cyber security\",\"Security Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/\",\"name\":\"The Future of Cybersecurity -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cy.jpg\",\"datePublished\":\"2020-09-21T05:30:08+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/#primaryimage\",\"url\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cy.jpg\",\"contentUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cy.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/09\\\/21\\\/the-future-of-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/claritytg.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Future of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#website\",\"url\":\"https:\\\/\\\/claritytg.com\\\/\",\"name\":\"\",\"description\":\"Your Solutions Provider\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/claritytg.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\",\"name\":\"Bruce Kreeger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"caption\":\"Bruce Kreeger\"},\"url\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/author\\\/bruec-kreeger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Future of Cybersecurity -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"The Future of Cybersecurity -","og_description":"The Future of Cybersecurity With an increase in &#8220;Remote Workers&#8221; expected to continue to rise so are Cyber-attacks which have increased over 2019 exponentially. Phishing, Ransomware, DDoS, and password-based attack vectors are all in play significantly. Joining the top tier are compromised business emails and IoT and AI-based attacks. We already knew that attacks on [&hellip;]","og_url":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/","article_published_time":"2020-09-21T05:30:08+00:00","og_image":[{"url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/08\/cy.jpg","type":"","width":"","height":""}],"author":"Bruce Kreeger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruce Kreeger","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/"},"author":{"name":"Bruce Kreeger","@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a"},"headline":"The Future of Cybersecurity","datePublished":"2020-09-21T05:30:08+00:00","mainEntityOfPage":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/"},"wordCount":837,"image":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/08\/cy.jpg","keywords":["CEH","cybersecurity","Firewall","Hardware Firewall","Intrusion detection","Penetration Testing","Vulnerability detection."],"articleSection":["cyber security","Security Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/","url":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/","name":"The Future of Cybersecurity -","isPartOf":{"@id":"https:\/\/claritytg.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/08\/cy.jpg","datePublished":"2020-09-21T05:30:08+00:00","author":{"@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a"},"breadcrumb":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/#primaryimage","url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/08\/cy.jpg","contentUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/08\/cy.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/claritytg.com\/index.php\/2020\/09\/21\/the-future-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/claritytg.com\/"},{"@type":"ListItem","position":2,"name":"The Future of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/claritytg.com\/#website","url":"https:\/\/claritytg.com\/","name":"","description":"Your Solutions Provider","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/claritytg.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a","name":"Bruce Kreeger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","caption":"Bruce Kreeger"},"url":"https:\/\/claritytg.com\/index.php\/author\/bruec-kreeger\/"}]}},"_links":{"self":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts\/11707","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/comments?post=11707"}],"version-history":[{"count":0,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts\/11707\/revisions"}],"wp:attachment":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/media?parent=11707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/categories?post=11707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/tags?post=11707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}