The Swamp logo

How Cyber Security Has Changed in the Last 10 Years

Andrew Obuchowski discusses the various changes that have occurred in the cyber security world within the last decade.

By Andrew ObuchowskiPublished 2 years ago 3 min read
Like

The world has changed drastically over the past ten years. Even the last two years have shown us so much change, not all of it for the better. When it comes to technology, ten years may as well be a hundred, for it changes so rapidly.

Cybersecurity has been around since the internet's beginning and has improved significantly over the years. Experts have learned how to detect and respond to new threats, preventing disasters before they occur. Let's see how cybersecurity has changed over the past decade.

New Threats

Cybersecurity has always been about protecting people and their information from those with ill intentions. This means that part of cybersecurity has always been (and will always be) about handling threats as they arise.

Cyber threats and crime have steadily increased since the internet was first invented. Spyware and malware are commonplace these days, but that wasn't always the case. These days most security software tools can easily detect and block these risks, but it took time to get to that point.

Other new cyber threats include ransomware, Man in the Middle Attacks (MitM), Cyptojacking, and Distributed Denial of Service Attacks. All threats are methods of interrupting business, the flow of information, or security.

Unfortunately, these threats will continue to evolve, primarily as people rely more on virtual alternatives for shopping, interactions, and business needs. These risks can be mitigated by a dedicated cybersecurity department.

Encryption

These days experts recommend that anything needing to remain secure and confidential should go through an encryption process. This process makes data unreadable for those without the key (unauthorized persons).

Encryption has become commonplace for most organizations. For example, cellular companies are expected to encrypt texts to protect their customers. Online businesses must encrypt customers' data, including their payment methods and personal information.

Two-Factor Authentication

Another standard security procedure is two-factor authentication, aka two-step authentication. This is a simple process with a powerful effect. Two-factor authentication provides an additional layer of protection.

Users who opt into two-factor authentication will be sent a code (through SMS or to a secure secondary app), which they must enter into the system before logging in. Without this code, one cannot log in. Since hackers have difficulty accessing SMS (or app) info alongside everything else required, two-factor authentication makes an account harder to access for those without permission.

New Technologies

New technology pops up every day. Some tech makes it easier for us to stay safe, while others make it more challenging. However, one cannot ignore the benefits some of these new technologies can offer.

Blockchain is arguably one of the most critical developments from a security standpoint. Blockchain offers a secure method of storing information. When data is stored in a blockchain, it cannot be altered. This is the gold standard when it comes to sharing vital information securely.

Artificial intelligence and deep learning have also significantly impacted the world of cybersecurity. These tools are the foundation of many modern security steps, including two-factor authentication. Other alternatives include facial recognition, fingerprint technology, and other biometric scans.

IoT Security Steps

The Internet of Things (IoT) has changed how we view technology. It makes it easier to connect to the world around us. Unfortunately, without security, it also makes it easier for hackers to connect to the same world.

IoT setups typically include security cameras, printers, alarm systems, and more. We don't want hackers to get their hands on these devices. Enabling strong security measures, such as firewalls and scalable security frameworks, help prevent accidents and breaches.

Continuing Education and Improvement

We must accept that cyber risks will continuously develop and evolve. To protect ourselves, we must be willing to adapt and improve our security measures, even when it feels inconvenient.

cybersecurity
Like

About the Creator

Andrew Obuchowski

Andrew Obuchowski is a seasoned expert in cyber forensics and information security. Throughout his notable career, he has worked in various roles such as police sergeant, teacher, mentor, digital forensic consultant, and courtroom expert.

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.