Malware/Data breach incidents occurring just before the close of 2019 basically hint at what impending headlines will focus on…
Ninety-seven percent of Fortune 100 companies rely on Veritas Technologies to reveal data insights that drive competitive advantage. With their deep experience derived from serving enterprises of all sizes, the teams at Veritas have distilled three headlining issues that readers can monitor and prepare for this year.
Ransomware has become big business
Cybercriminals have long relied on social engineering as one of their most successful modes of attack. By fooling employees to share information or download their malware, ransomware attackers acquire the credentials they need to capture a company’s most important digital assets. Without a clean backup copy of an organization’s entire data catalog, users are held hostage at the mercy of criminals seeking monetary gain.
To stay ahead of the cat and mouse game, cybercriminals’ techniques will evolve in response to more rigorous company policies. We’re already seeing the beginnings of a secondary illegal market for stolen credentials. On the dark web, ransomware is fueling the rise of a burgeoning market that makes it quick and easy for cybercriminals to gain remote access to corporate systems.
This boom is being supported by a shifting attack strategy that will only become more embedded in 2020. Ransomware attackers will increasingly target their efforts, not on existing employees, but on adjacent targets and other accounts with access to the systems of their intended victim. This includes external contractors, freelancers, partners and approved vendors.
In Singapore for example, the latest malware incidents that hit before we close out the year is yet another timely reminder that ransomware will no longer be a matter of data denied. It will be a case of data compromised. Globally, the public sector, healthcare and manufacturing are emerging as some of the most likely targets. To bolster data security, the Singapore government, for example, has set up the high-level Public Sector Data Security Review Committee (PSDSRC).
One of the key recommendations for improving transparency in the public sector’s data security is to publish the government’s policies and standards relating to personal data protection and provide an annual update.
At Veritas, we believe that this is a step in the right direction as publishing these standards also allows vendors that work for the government to understand the standards that must be met. Very soon, data responsibility will not just be for internal consumption. It will be how organizations do business and choose who they work with.
The growth of container technology
Container technology will continue to make businesses more versatile in their ability to deploy and scale applications.
This rapid deployment is leading to questions about data integrity as an increasing number of new containerized applications are designed to create and modify persistent data. This evolution is emphasizing the need for mature backup and recovery processes that protect containerized data and applications wherever they reside.
Currently, container technology allows for rapid and portable deployment of environments that further the abstraction started with virtualization, and enables additional abstraction of the hardware. As organizations continue to shift workloads and transition to hyperconverged infrastructure, they will need the simplicity, ease of use, faster infrastructure deployment and the ability to easily scale.
In addition, containers allow admins to embrace the concept of a cloud experience from an on-prem infrastructure. The technology provides them with the ability to run a server for an application, rather than wait two weeks to get access to hardware, among other hassles. While the data still needs to be compliant, safe and interrogated as needed, container technology provides a bird’s eye view of the data to those who need it. This is particularly important with the continued rise in edge computing where data is being generated everywhere and becoming more siloed, as well as the constantly shifting regulatory landscape.
The year of AIOps adoption
Many organizations have been experiencing a shift from the traditional core enterprise data center to a decentralized on-prem and cloud infrastructure. Another major trend is what I have termed “Digital Users”. Digital Users include machine agents, containerized applications (as above), process-oriented analytics, IoT devices and API-driven infrastructure.
Digital Users can number in the thousands and quickly expose the complexities associated with the manual processes required to deploy infrastructure, apps, and data management and protection services.
Artificial Intelligences for IT Operations (AIOps) and API automation holds the promise to abstract complexity and provide significant new levels of autonomous processes. These are significant trends that will make AIOps an imperative in 2020.
Looking ahead to 2020, collecting data from various systems, tools and devices and the application of analytics, AI and machine learning will gain speed, simplifying the adoption of Digital Users, enhancing IT operations and information management with capabilities that will include:
- Automatic detection and self-directed, real-time action on events and issues
- Automated workload and data analysis that drives resiliency orchestration
- API enabled provisioning, management, protection and recovery
- Proactive data classification and action spotlighting potential risks and threats