Identity theft. Data breaches. Imposter profiles. Fake news. These topics are just a few of the major security threats that have become part of our day-to-day conversation and, with new breaches making headlines nearly every day, there seems to be no end in sight. But experts in the Florida High Tech Corridor are digging into the human elements of cybersecurity – from fresh takes on development and training of tomorrow’s workforce to gaining a better understanding of why people hack – to battle and prevent the threats that abound in our digital world.
Navigating the Vulnerability of Connectivity
From watches to smart buildings, more than 26 billion devices will be connected to the Internet of Things (IoT) this year, feeding data about people’s habits and movements to databases around the world. As organizations often lack direct control in the manufacturing of hardware and software being utilized by these connected devices, IoT breaches have been a reality for years, with the first recorded attack on utility systems dating back to 2011.
Of course, these breaches don’t always come in the form of large-scale external attacks. Even the smallest security flaw can lead to major problems for technology conglomerates. Apple’s recent FaceTime glitch is a perfect example; as The New York Times pointed out, “A bug this easy to exploit is every company’s worst security nightmare … and every cybercriminal’s dream.” With potential privacy breaches literally at our fingertips, it should come as no surprise that approximately 80 percent of consumers lack trust in IoT devices to protect their data or privacy.
Organizations recognize this vulnerability, as well as the potential to lose public trust and millions of dollars at the hands of a data breach, and are investing accordingly at unprecedented rates. A recent Gartner survey predicts the $1.5 billion dedicated to cybersecurity protection in 2018 will more than double by 2021.
But, what exactly are companies looking to invest in?
Often, investments are focused on technology improvements for real-time adaptive protection, management, assessment and testing. Given the dizzyingly rapid evolution of technology, however, the answer might lie in a more constant component linking the defensive and offensive lines of the cybersecurity battle – the humans behind the attacks and those guarding against them.