EOL IT Services has now merged with tier1 Asset Management Ltd

The future of Data Security – what will things look like in 10 years?

by | Jan 25, 2022 | Uncategorised

The below article is provided on behalf of Steve Inglessis, Director at DataRaze – www.dataraze.co.uk – as the second instalment of what the future of Data Security will look like in 10 years.

Data Security in 2027 – Part 2

In the past, a business’ security infrastructure was built around a single line of defence and once a hacker had broken that line, there was nothing else in place to slow down or prevent access.

In the modern, digital-first world, this problem is much more apparent.

Today, the huge number of mobile connected devices, applications and cloud-based services means cyber criminals have a variety of avenues through which they can target information and, as a result, businesses now need multiple layers of security across different devices to prevent threats.

Siloed security measures however – are not the solution. The manual maintenance of siloed security solutions across different entry points is not sustainable; especially as the volume, velocity and potency of cyber attacks continue to increase. The time it takes for a human operator to update each security solution is the time a system is exposed to external threats. A skilled hacker could navigate their way through these solutions to the business’ core network in no time at all.

Speaking recently, Paul Lipman, Chief Executive of BullGuard said: “We’re seeing billions of new devices entering businesses and homes, with little-to-no security built in, and which are challenging to update. This is a hacker’s dream and a recipe for a cyber-security disaster.”

And, with the General Data Protection Regulation (GDPR) set to arrive in May 2018, the need for a comprehensive security framework should undoubtedly be at the top of every business’ priorities.

Steve Inglessis, Director at DataRaze, questions what the data security landscape will look like in this super connected world. What is different about data security in 2027 compared to that of 2017? In this article, Inglessis assesses the future of data security, particularly how artificial intelligence (AI) and cyber security can come together to develop a comprehensive, firm-wide security framework.

The future of cybersecurity will be built around holistic, firm-wide predictive analysis and threat recognition powered by AI and validated by human operators. AI is already being used in certain business environments to help support day-to-day activities, next is the application of AI for cybersecurity.

In an internal environment, AI could potentially run a business’ entire security network and provide IT infrastructure support. A good example of this is IPSoft’s Amelia – cited as the ‘most human AI’. Amelia is an AI solution that can manage everything from the front office to back office, connecting to the heart of your enterprise and optimising operations across the board.

The future of data security – Teaching AI to operate

Another asset to include in the development of the business’ security infrastructure is ethical hackers; skilled professionals who understand how to look for vulnerabilities in digital infrastructure and help businesses to rectify them.

Ethical hackers and IT experts can be used to ‘teach’ the AI security solution at scale, helping it to individually target specific types of malware. The future of data security is likely to be a mixture of artificial intelligence and cyber security managed by humans.

With AI for cyber security at the helm, supported by IT experts and ethical hackers, businesses could benefit from a proactive threat solution that offers a thorough and adaptive rapid response.

A problem with over-reliance on AI in isolation, is that AI-driven threat detection and automated protection could lead to a number of false positives, resulting in far too many alerts which people could slowly start to ignore.

When a real threat does arrive, employees are too slow to respond. This is why a combination of both AI and human operatives is key to creating a robust security framework. AI can provide the business with sophisticated security, whilst ethical hackers can teach the AI and test the structural integrity of the security framework, resulting in a stronger defence strategy.

In the past, this level of threat analysis and detection wasn’t necessary. But today, there are more than 390,000 new malicious programs registered every day, according to the AV-TEST Institute – and last year alone, one in five UK businesses was hit by a cyber attack.

And, while cyber attacks on connected devices and business infrastructures will continue to increase, the emphasis on adding additional security that goes above and beyond regulatory compliance will continue to be renewed.

Over time however, security staffing and costs will gradually reduce as AI improves efficiency and automatic reactions to potential security threats.

Another key aspect that will become more prominent in the future is collaboration between security firms across countries, sharing threat analyses, vulnerabilities, security infrastructure and reports to help each other to build more resilient networks.

About 70% of attacks are known to exploit vulnerabilities with available patches, according to The Verizon Data Breach Report while hackers are able to take advantage of vulnerabilities within minutes of them becoming public knowledge.

This is why artificial intelligence and cyber security together can play such a pivotal role in the fast assessment of security vulnerability as it is able to identify and rectify security issues in real-time, preventing hackers from exploiting vulnerabilities before they have been secured.

Making breaches known

In the event the business’ security is breached, the next step in the process needs to be communication and repair. This means communicating with employees, tech specialists, managers, PR and communication teams and external parties such as clients and the press – if necessary.

Hiding a data breach could result in severe consequences, especially considering GDPR. Under GDPR, businesses that handle the data of EU citizens and experience a data breach must inform the data subjects without delay – in addition, the data breach must be reported to the relevant supervisory authority as soon as possible.

Of course, as data and technology continues to evolve, so will the regulations and laws that govern them. While GDPR represents the biggest shift in data protection law for more than 20 years, it’s already playing catch up. In the years to come, there will undoubtedly be regular updates to the regulation to meet changes in the usage and application of data.

As mentioned previously, it’s no longer practical or feasible to manage your business’ security manually. Your IT experts and security specialists may have the expertise, but they cannot be everywhere at once. The inclusion of multiple devices in the business’ hierarchy means there is more than one entrance to critical assets that are vulnerable to cyberattacks – and a data breach under GDPR must be avoided at all costs.

However, with AI supporting the security infrastructure and IT security specialists managing it, businesses can benefit from a powerful, firm-wide solution that can protect them from any attack.

With over 25 years industry experience, tier1 are proud to be the UK’s most accredited ITAD supplier. We possess the skills, accreditations and experience to handle our clients’ data with the care they deserve, and to dispose of it responsibility and legally.

Contact us today on 0161 777 1000 or visit https://www.tier1.com to find out how we can help you dispose of your data safely and reliably.

Recent Stories

The Hidden Environmental Impact of Our Smartphones.

The Hidden Environmental Impact of Our Smartphones.

Checking emails, social media or the news; banking, making payments, taking photographs, finding our way; it is fair to say that we would be lost without our smartphones, perhaps literally. Oh, let’s not forget, our now indispensable devices also make calls. Essential...

Delivering Social Value Through Our Business Operations

Delivering Social Value Through Our Business Operations

We have become increasingly aware of economic, social and environmental issues. Our renewed sense of community, which naturally came into focus during Government lockdowns, furthered the opportunity for ethical businesses to drive social impact, rather than simply be...

Navigating the Subjectivity of Refurbished IT Devices

Navigating the Subjectivity of Refurbished IT Devices

Reconditioned, renewed, pre-owned… as there are no hard and fast definitions of what the phrase ‘refurbished technology’ means, purchasing restored devices can feel a little like navigating a minefield. This confusion, poor experiences or deep-rooted misconceptions...

Categories