Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Has to Be a Priority in 2020

Security Has to Be a Priority in 2020

Cybercriminals aren’t exactly holding back when it comes to attacking businesses, which means that businesses can’t rest on their haunches as the new year rolls in. Let’s take a few moments to look toward the near future, and the issues that cybersecurity professionals are warning us about.

Misconfigured Cloud Environments

There is no question that cloud-based solutions deliver considerable benefits to businesses, and as a result, there has been considerable growth in the adoption of these cloud solutions. However, this growth isn’t necessarily all that it’s cracked up to be, as it has led to a steep divide between the adoption of these solutions, and the skills needed to sustain these infrastructures and the security needed to protect them.

Gartner has given credit for a full 95 percent of public cloud security failures to - not the providers of the platform - but the customers using these public cloud platforms. 2019 alone has seen more than its fair share of security issues due to misconfigured cloud solutions, such as the now-infamous Capital One breach.

If these trends continue, it is clear that 2020 will see many of these issues exacerbate.

Compliance Fatigue

Among the widespread threats to cybersecurity, one of the biggest issues has predictably been the understandable wearing down of businesses in the face of so many regulations and other measures that are dictated to them - often contradicting one another. The requirements are so numerous, with so few actions directed toward the enforcement of them, it is little wonder that businesses let certain requirements slide.

This is dangerous, and the regulations that businesses need to abide by are in place for the mutual benefit of a business and its clientele. If a business fails to meet these standards, it is putting the welfare of its clients and of its own operations in jeopardy.

Exacerbating this problem further, some businesses could be subject to multiple regulations and compliances at once, with the potential for these regulations and compliance requirements to restrict the effectiveness of the others, or even negate them. As a final result, it only becomes more likely that, in response to these ever-increasing demands, some businesses may neglect their cybersecurity, falling to oversights and omissions.

Phishing Attacks

Regardless of how much cybersecurity solutions improve, there is one weakness that can’t just be patched: the human nature of the user. Whether we’re referring to one of your employees, or yes, you yourself, many times the least secure aspect of any of your business computing is the person sitting at the workstation. After all, it is much easier to manipulate a human being than it is to trick a computer… a trend that isn’t likely to change in 2020, and not for many years after that.

This means that one of your most worthwhile investments into cybersecurity will actually be the time you and your employees spend learning how to spot impending scams and mitigate them before they cause any trouble.

Mobile Malware

Considering how much our reliance on our mobile devices has increased, it should come as no surprise that malware that targets mobile devices has become more popular as well - and we’re talking a lot more popular. Throughout 2018, Kaspersky Lab observed a significant increase in malware attacks that targeted banking applications - during that year alone, the number of malware files used jumped from 18,501 to 29,841. This just goes to show that cybercriminals are focusing their efforts where they are more likely to be effective.

Voyage Technology is here to help businesses like yours handle their technology, part of which means assisting in keeping it secure. To learn more about what you need to do in the new year to protect your operations, reach out to us today by calling 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 06 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Workplace Tips Privacy Computer Phishing Google Email Workplace Strategy Hosted Solutions Collaboration Small Business Users Backup Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Social Media Browser Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Information Miscellaneous Artificial Intelligence Holiday Facebook Automation Gadgets Compliance Covid-19 Cloud Computing Training Outsourced IT Remote Work Server Managed Service Provider IT Support Spam Employee/Employer Relationship Encryption Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Blockchain Bandwidth Windows 10 Business Technology Apps Two-factor Authentication Data Security Vendor Mobile Office Managed Services Tip of the week Employer-Employee Relationship Networking Chrome Budget BYOD Voice over Internet Protocol Mobile Device Management Apple Gmail App WiFi Computing Information Technology Managed IT Services How To Hacker Office 365 BDR HIPAA Avoiding Downtime Applications Marketing Password Physical Security Access Control Conferencing Big Data Operating System Retail Risk Management Computers Office Tips Analytics Router Augmented Reality Website Storage Bring Your Own Device Healthcare Help Desk Virtual Private Network 2FA Health Microsoft 365 Telephone Social Document Management Cybercrime Solutions Cooperation Scam Data loss Customer Service Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Remote Workers Windows 11 Firewall Monitoring Display Printer Free Resource Paperless Office Excel Infrastructure Project Management Going Green The Internet of Things Windows 7 Managed IT Service Multi-Factor Authentication Settings Mobility Printing Downloads Machine Learning Wireless Content Filtering Licensing YouTube Entertainment Employees Cryptocurrency Maintenance Antivirus Customer Relationship Management Integration Data Privacy Telephone System Virtual Desktop Hacking Cost Management Data storage LiFi Holidays Presentation Outlook Data Storage Wireless Technology Robot Money Video Conferencing Managed Services Provider Humor Virtual Machines Professional Services User Tip Modem Processor Mobile Security IT Management Sports Word Mouse VPN Meetings iPhone Smart Technology Administration Computer Repair Supply Chain Vulnerabilities Saving Time Safety Images 101 Organization Paperless Alt Codes Electronic Medical Records Download Alerts SharePoint Digital Security Cameras Co-managed IT Smart Devices Downtime Memory Application Writing Browsers Connectivity Technology Care Break Fix Lenovo Remote Working Hosted Solution Business Communications Typing Data Breach Virtual Reality Google Play Upload Videos Scams Multi-Factor Security Server Management Electronic Health Records IBM Private Cloud Social Network Identity Theft Wasting Time Knowledge IoT Hybrid Work Google Drive Dark Web Superfish Human Resources Trend Micro Twitter Security Cameras Trends Customer Resource management Regulations Cables Google Calendar Software as a Service Error 5G Managing Costs Experience Social Engineering Data Analysis Star Wars Google Docs Microsoft Excel Unified Communications Staff Google Apps Bitcoin eCommerce Running Cable Competition Remote Computing SSID Gamification Social Networking IT Maintenance Google Wallet Legislation Surveillance Virtual Assistant Tablet Virtual Machine Fileless Malware Business Intelligence Wearable Technology Reviews Shortcuts Windows 8 Laptop Alert Medical IT Content Dark Data Health IT Motherboard Ransmoware Drones Comparison Managed IT Development File Sharing Transportation User Hypervisor How To Directions Assessment Vendors Permissions Shopping Be Proactive Optimization Halloween Notifications PowerPoint Workforce Specifications IP Address Travel Employer/Employee Relationships Google Maps Microchip Navigation Internet Exlporer Threats Fraud Techology PCI DSS Gig Economy Workplace Strategies Hacks Scary Stories Username Fun Recovery Meta Black Friday Internet Service Provider Unified Threat Management Teamwork Regulations Compliance Deep Learning Hard Drives Evernote Database Amazon Unified Threat Management IT Technicians Memes Domains SQL Server Network Congestion Proxy Server Cookies Outsource IT Cyber Monday Net Neutrality Education Financial Data Media History Refrigeration Tactics Environment Hotspot User Error Mirgation Smartwatch Mobile Computing IT Public Speaking Azure Search Nanotechnology Small Businesses Procurement Lithium-ion battery Point of Sale Telework Best Practice Cyber security Tech Entrepreneur Addiction Displays Language Chatbots CES Network Management Communitications Buisness Tech Support Management Monitors Screen Reader Outsourcing Legal Distributed Denial of Service Supply Chain Management IT solutions FinTech Business Growth Undo Term Service Level Agreement Computing Infrastructure Identity Workplace IT Assessment Websites Value Cortana Bookmark Smart Tech Hiring/Firing Flexibility

Blog Archive