Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Security Has to Be a Priority in 2020

Security Has to Be a Priority in 2020

Cybercriminals aren’t exactly holding back when it comes to attacking businesses, which means that businesses can’t rest on their haunches as the new year rolls in. Let’s take a few moments to look toward the near future, and the issues that cybersecurity professionals are warning us about.

Misconfigured Cloud Environments

There is no question that cloud-based solutions deliver considerable benefits to businesses, and as a result, there has been considerable growth in the adoption of these cloud solutions. However, this growth isn’t necessarily all that it’s cracked up to be, as it has led to a steep divide between the adoption of these solutions, and the skills needed to sustain these infrastructures and the security needed to protect them.

Gartner has given credit for a full 95 percent of public cloud security failures to - not the providers of the platform - but the customers using these public cloud platforms. 2019 alone has seen more than its fair share of security issues due to misconfigured cloud solutions, such as the now-infamous Capital One breach.

If these trends continue, it is clear that 2020 will see many of these issues exacerbate.

Compliance Fatigue

Among the widespread threats to cybersecurity, one of the biggest issues has predictably been the understandable wearing down of businesses in the face of so many regulations and other measures that are dictated to them - often contradicting one another. The requirements are so numerous, with so few actions directed toward the enforcement of them, it is little wonder that businesses let certain requirements slide.

This is dangerous, and the regulations that businesses need to abide by are in place for the mutual benefit of a business and its clientele. If a business fails to meet these standards, it is putting the welfare of its clients and of its own operations in jeopardy.

Exacerbating this problem further, some businesses could be subject to multiple regulations and compliances at once, with the potential for these regulations and compliance requirements to restrict the effectiveness of the others, or even negate them. As a final result, it only becomes more likely that, in response to these ever-increasing demands, some businesses may neglect their cybersecurity, falling to oversights and omissions.

Phishing Attacks

Regardless of how much cybersecurity solutions improve, there is one weakness that can’t just be patched: the human nature of the user. Whether we’re referring to one of your employees, or yes, you yourself, many times the least secure aspect of any of your business computing is the person sitting at the workstation. After all, it is much easier to manipulate a human being than it is to trick a computer… a trend that isn’t likely to change in 2020, and not for many years after that.

This means that one of your most worthwhile investments into cybersecurity will actually be the time you and your employees spend learning how to spot impending scams and mitigate them before they cause any trouble.

Mobile Malware

Considering how much our reliance on our mobile devices has increased, it should come as no surprise that malware that targets mobile devices has become more popular as well - and we’re talking a lot more popular. Throughout 2018, Kaspersky Lab observed a significant increase in malware attacks that targeted banking applications - during that year alone, the number of malware files used jumped from 18,501 to 29,841. This just goes to show that cybercriminals are focusing their efforts where they are more likely to be effective.

Voyage Technology is here to help businesses like yours handle their technology, part of which means assisting in keeping it secure. To learn more about what you need to do in the new year to protect your operations, reach out to us today by calling 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 04 February 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet Malware IT Support IT Services Privacy Google Email Workplace Tips Computer Phishing Collaboration Hosted Solutions Users Workplace Strategy Small Business Ransomware Mobile Device Microsoft Backup Productivity Managed Service Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Android Data Recovery AI Disaster Recovery VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Information Facebook Miscellaneous Artificial Intelligence Training Covid-19 Gadgets Cloud Computing Compliance Server Managed Service Provider Remote Work Outsourced IT IT Support Encryption Employee/Employer Relationship Spam Office Windows 10 Data Management Government Business Continuity Blockchain Business Technology Windows 10 Wi-Fi Virtualization Bandwidth Mobile Office Vendor Two-factor Authentication Data Security Apps Apple Managed Services Voice over Internet Protocol App Tip of the week Mobile Device Management Gmail WiFi Networking Employer-Employee Relationship Chrome Budget BYOD Hacker Avoiding Downtime Access Control Marketing HIPAA Computing Applications Information Technology How To BDR Office 365 Conferencing Computers Bring Your Own Device Virtual Private Network 2FA Health Website Healthcare Operating System Router Retail Risk Management Managed IT Services Big Data Help Desk Office Tips Analytics Augmented Reality Storage Password Display Printer Windows 11 Cooperation Paperless Office Infrastructure Remote Workers Excel Going Green Document Management Firewall Free Resource Cybercrime Project Management Windows 7 Scam Microsoft 365 Data loss The Internet of Things Solutions Monitoring Social Patch Management Save Money Remote Monitoring End of Support Vulnerability Vendor Management Telephone Customer Service Physical Security Presentation Video Conferencing Mouse Managed Services Provider Entertainment Professional Services Computer Repair Virtual Machines Wireless Technology Administration Supply Chain Telephone System Cost Management iPhone Word Machine Learning Settings Vulnerabilities Printing Wireless Content Filtering Maintenance YouTube Images 101 Modem Antivirus User Tip Processor Mobility Cryptocurrency Safety Mobile Security Multi-Factor Authentication Data Privacy Virtual Desktop Smart Technology Data storage LiFi Employees Integration Robot Outlook Saving Time Money Customer Relationship Management Managed IT Service Humor Holidays Downloads IT Management Meetings Data Storage VPN Sports Licensing Hacking Multi-Factor Security Employer/Employee Relationships Social Network Education Outsource IT Point of Sale Environment IoT Media Dark Web PCI DSS User Navigation Mobile Computing Trends Gig Economy Search Google Calendar Internet Service Provider Teamwork Network Management Customer Resource management Tech Support Small Businesses Regulations Best Practice Displays Star Wars Monitors IP Address Microsoft Excel Regulations Compliance Data Analysis Evernote Gamification Buisness Staff Memes Legislation Net Neutrality SQL Server Legal IT solutions Websites Outsourcing Social Networking Business Growth Financial Data Recovery History Fileless Malware IT SharePoint Content Electronic Medical Records Workplace Wearable Technology Smartwatch Hard Drives Cortana Domains Comparison Procurement Azure Health IT Hiring/Firing Motherboard Tech Alt Codes Assessment Writing Paperless Permissions Telework Cyber security Lenovo Directions Communitications Downtime Virtual Reality Co-managed IT CES Refrigeration Public Speaking Specifications Supply Chain Management Server Management Hosted Solution Private Cloud Technology Care Microchip Term Typing Identity Theft Internet Exlporer Business Communications Lithium-ion battery Fraud FinTech Superfish IT Assessment Entrepreneur Username Twitter Scams Knowledge Black Friday Flexibility Value Google Drive Error Hybrid Work Database Social Engineering Human Resources Organization Undo Smart Devices Remote Computing Cables IT Technicians Digital Security Cameras 5G Cookies Experience Cyber Monday Remote Working Memory Google Docs Proxy Server Unified Communications Google Play Bitcoin Tablet Tactics Running Cable Google Apps Hotspot Data Breach Electronic Health Records Google Wallet Alert IT Maintenance Mirgation Videos Nanotechnology Dark Data Wasting Time Managed IT File Sharing Business Intelligence Security Cameras Windows 8 Addiction Laptop How To Shortcuts Language Application Trend Micro Software as a Service Drones Management Notifications Ransmoware Chatbots Screen Reader IBM Distributed Denial of Service Managing Costs Travel Vendors Techology SSID Google Maps Service Level Agreement Halloween Be Proactive Computing Infrastructure eCommerce Surveillance Virtual Assistant Workforce Identity Unified Threat Management Threats Smart Tech Virtual Machine Bookmark Unified Threat Management Medical IT Hacks Download Scary Stories Workplace Strategies Alerts Reviews Competition Development Transportation Meta Fun Deep Learning Amazon Connectivity Network Congestion Break Fix Hypervisor Browsers User Error PowerPoint Upload Shopping Optimization

Blog Archive