{"id":46221,"date":"2021-10-18T12:25:41","date_gmt":"2021-10-18T10:25:41","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=46221"},"modified":"2021-12-01T10:13:55","modified_gmt":"2021-12-01T09:13:55","slug":"future-threats-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/future-threats-in-cybersecurity\/","title":{"rendered":"Future threats in cybersecurity"},"content":{"rendered":"<p>Last October 6, the <strong>IT World Canada&#039;s second MapleSec online conference<\/strong>. In it, the experts agreed that <strong>artificial intelligence, quantum computing, deepfakes and ransomware are the future cybersecurity threats.&nbsp;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>artificial intelligence<\/strong><\/h2>\n\n\n\n<p>The predictions were made during Tuesday&#039;s opening session, titled &quot;The Threat Landscape 2023 and Beyond.&quot;<\/p>\n\n\n\n<p>They indicated that the <strong>AI-generated malware<\/strong> It will be one of the emerging threats in the near future. AI-generated threats will use intelligence to infect their victims or deploy malicious applications faster than what happens now.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Quantum computing<\/h2>\n\n\n\n<p>The <strong>quantum computing<\/strong> and the transition to post-quantum cryptography will be the biggest challenge organizations will have to face in the next five years.&nbsp;<\/p>\n\n\n\n<p>They mentioned that the <strong>cryptography<\/strong> It is essential for the security and privacy of everything we do online<em> <\/em>and that quantum computing would destroy current algorithms, but luckily, currently, work is being done on algorithms resistant to quantum attacks that can run on conventional computers. Although once secure quantum cryptography is established, quantum computers will spread to a wider audience.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ransonware<\/h2>\n\n\n\n<p>About him <strong>ransomware<\/strong>, stated that it is a failure both in training and awareness and in the administration of credentials. Online training is not enough. Companies should develop an effective training program to ensure employees are engaged and aware of the ransomware threat.<\/p>\n\n\n\n<p>We could see that the statistics on successful ransomware attacks are quite alarming, the 60% of affected SMEs sink and some companies cannot obtain cyber insurance because they have already been cyber victims.&nbsp;<\/p>\n\n\n\n<p>Prevention and awareness are the keys to stopping ransomware attacks, employees should be taught to look for suspicious things, like a message from the CEO late on a Friday asking for millions of dollars to be transferred to a foreign account.<\/p>\n\n\n\n<p>The session concluded with a five-year prediction on what will be <strong>the mistake that people will make to leave their cybersecurity unprotected<\/strong>. They pointed out 3 possible errors:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Click on <strong>phishing links<\/strong> from unverified sources.<\/li><li>Over the <strong>software developers,<\/strong> still treating security as something to be done at the end of product development and not from the beginning.<\/li><li>The <strong>credulity of humans<\/strong>.<\/li><\/ol>\n\n\n\n<p>If you want to change things and reach the top in cybersecurity, there is no better time than now to start training and grow in your professional career. That&#039;s why we recommend our <a href=\"https:\/\/eiposgrados.com\/eng\/master-in-cybersecurity\/\"><strong>Master in Cybersecurity Management, Ethical Hacking and Offensive Security<\/strong> <\/a>&nbsp;and works in one of the professions with the most future today.<\/p>","protected":false},"excerpt":{"rendered":"<p>At IT World Canada&#039;s MapleSec online conference, experts spoke about future threats in cybersecurity. We leave you the summary on our blog.<\/p>","protected":false},"author":1,"featured_media":51586,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[],"class_list":["post-46221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/46221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=46221"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/46221\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/51586"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=46221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=46221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=46221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}