來源:Readwrite 時(shí)間:2020-04-15 16:04:43 作者:Abeer Raza
Cybersecurity, Modern Technology and Business Threats
數(shù)據(jù)觀 | 張青青(譯)
The year 2020 is overcome with the COVID-19. But the virus isn’t the only threat to our security. 2020 is also set to revolutionize the world with advancements that will shape the future of lives and businesses, alike. We now have 5G and IoT to Artificial Intelligence, Cloud technology, and Machine Learning. These technologies will become an integral part of our daily lives in creating efficiency, saving time, reducing costs, and unlocking new opportunities.
2020年新冠病毒席卷全球,但這并非是危及人類安全的唯一威脅。2020年也是某些先進(jìn)技術(shù)改變世界的一年,這些先進(jìn)的技術(shù)變革將會(huì)改變未來人類社會(huì)的生活方式和商業(yè)模式。如今,我們已經(jīng)掌握了5G技術(shù)、物聯(lián)網(wǎng)、人工智能、云科技和機(jī)器學(xué)習(xí)。諸類科技將會(huì)幫助我們提高工作效率,節(jié)約工作時(shí)間,降低生產(chǎn)成本,并創(chuàng)造新的商機(jī),變成我們?nèi)粘I钪斜夭豢缮俚囊徊糠帧?/font>
Though this optimistic language is something you hear quite often (and it’s not untrue to a large degree), the more the world transforms towards a digital future, the higher the rise in threats of Cyberattacks.
盡管關(guān)于技術(shù)的樂觀論調(diào)可謂老生常談,但長(zhǎng)遠(yuǎn)來看,這并非完全正確,即——“世界向未來數(shù)字化發(fā)展的程度越高,所帶來的網(wǎng)絡(luò)攻擊風(fēng)險(xiǎn)也就越大?!?/font>
Modern technology is set to increase the amount of data we create online, and protecting this data will be one of the defining arcs of this decade. From system security to network security, businesses will face challenges in optimizing their cybersecurity to prevent malicious attacks from being successful.
現(xiàn)代技術(shù)將增加我們?cè)诰€創(chuàng)建的數(shù)據(jù)量,保護(hù)這些數(shù)據(jù)資料,將會(huì)成為未來十年重中之重的主要任務(wù),從系統(tǒng)安全到網(wǎng)絡(luò)安全,企業(yè)將面臨優(yōu)化網(wǎng)絡(luò)安全問題的挑戰(zhàn)——能否成功地防止惡意網(wǎng)絡(luò)攻擊。
It is hard to prevent malicious attacks because these technologies are new, vulnerabilities are less known, scalability harder due to a lack of familiarity, thereby making all of these ambiguities an excellent target for bad actors to exploit.
隨著科技發(fā)展日新月異,網(wǎng)絡(luò)安全的漏洞難以洞察,因此我們很難阻止惡意網(wǎng)絡(luò)攻擊,并且由于我們對(duì)網(wǎng)絡(luò)攻擊缺乏充分地了解而導(dǎo)致計(jì)算機(jī)防護(hù)技術(shù)的發(fā)展變得更加困難,這片灰色地帶成為惡意攻擊者的絕佳目標(biāo)。
So let’s take a look at some of these technologies, modern regulations in place, and what businesses can do to combat this threat with regards to their cybersecurity.
因此,讓我們回顧某些當(dāng)下的技術(shù)、現(xiàn)代法規(guī)以及企業(yè)在網(wǎng)絡(luò)安全方面可以采取哪些措施來應(yīng)對(duì)網(wǎng)絡(luò)安全威脅。
The Advent of 5G and It’s Cybersecurity Vulnerabilities 5G的到來及網(wǎng)絡(luò)安全隱患
As 5G trials and roll-outs happen, we are entering a new era of communication and innovative consumer services. As the adoption of 5G will require companies and people to switch to all-software networks, the cycle of constant updates might result in security vulnerabilities.
隨著5G試運(yùn)行和全面實(shí)行的到來,我們正進(jìn)入通信和創(chuàng)新型消費(fèi)者服務(wù)的新階段。由于5G的運(yùn)行需要公司和其人員切換到全軟件網(wǎng)絡(luò),因此持續(xù)運(yùn)作更新的網(wǎng)絡(luò)閉環(huán)可能會(huì)導(dǎo)致網(wǎng)絡(luò)安全隱患。
These frequent updates are similar to the updates of smartphone software, but those about 5G networks can lead to security risks. Risks are something that early adopters will have to deal with since the number of 5G connected devices that send and receive information increases and remote access becomes much more commonplace, cybersecurity experts will have a huge challenge in front of them.
這些頻繁的更新類似于智能手機(jī)軟件的更新,但是關(guān)于5G網(wǎng)絡(luò)的更新可能會(huì)引發(fā)安全風(fēng)險(xiǎn)。由于發(fā)送和接收信息的5G連接設(shè)備數(shù)量增加,且遠(yuǎn)程訪問變得更加普遍,因此早期5G使用者必須應(yīng)對(duì)5G技術(shù)所帶來的安全風(fēng)險(xiǎn)。但跟5G使用者比起來,網(wǎng)絡(luò)安全專家更應(yīng)當(dāng)未雨綢繆。
With increased users and use, expanding the bandwidth for 5G will present opportunities for experts looking to exploit these vulnerabilities. As enterprises and cities become 5G powered, the attack surface will become much larger, putting the burden on governments and private enterprises to pump up and revolutionize their security tools and strategies to safeguard their devices, networks, and applications against malicious attackers.
隨著用戶和使用率的提高,5G寬帶的擴(kuò)展將會(huì)為研究網(wǎng)絡(luò)安全漏洞的專家提供發(fā)展機(jī)會(huì)。隨著5G全面覆蓋企業(yè)和城市,網(wǎng)絡(luò)攻擊的覆蓋面將變得加寬泛,這將使政府和私營(yíng)企業(yè)必須大力推廣和革新其安全工具和策略,以保護(hù)其設(shè)備、網(wǎng)絡(luò)和應(yīng)用程序免受惡意攻擊。
One problem that early adopters might face due to a lack of security infrastructure could be the authorization and identification of a 5G network. Access to the system can allow a significant threat to data and security, and perhaps these early users might adopt a stringent no-trust policy with regards to 5G network access.
由于網(wǎng)絡(luò)安全基礎(chǔ)設(shè)施的缺乏,早期的使用者可能會(huì)面臨5G網(wǎng)絡(luò)的授權(quán)和識(shí)別問題。訪問系統(tǒng)可能會(huì)對(duì)數(shù)據(jù)和安全性造成嚴(yán)重的威脅,也許這些早期的5G用戶可能會(huì)對(duì)5G網(wǎng)絡(luò)訪問表現(xiàn)出極大的不信任和排斥。
Don’t Think Phishing Is Over 網(wǎng)絡(luò)釣魚并沒有結(jié)束
Though technology is evolving rapidly in the digital landscape, cybersecurity experts will have to deal with phishing attacks. These attacks are often targeted to penetrate a network or infect the users of the network itself.
盡管數(shù)字領(lǐng)域技術(shù)飛速發(fā)展,但網(wǎng)絡(luò)安全專家還是不得不應(yīng)對(duì)網(wǎng)絡(luò)釣魚攻擊。 這些攻擊的目標(biāo)通常是滲透網(wǎng)絡(luò)或感染網(wǎng)絡(luò)本身的用戶。
Though phishing is a generally well-known attack, hackers and malicious actors are becoming smarter (thanks to technological evolution), and their attacks are becoming more and more sophisticated. So like 2019, security measures against Phishing will also be necessary for 2020 as well.
即使網(wǎng)絡(luò)釣魚已經(jīng)成為屢見不鮮的網(wǎng)絡(luò)攻擊手段,但黑客和惡意攻擊者變得越來越聰明(這也得益于科技發(fā)展),他們的攻擊手段也變得越來越狡詐。因此,就像2019年一樣,反釣魚的安全措施同樣在2020年也是有必要得到重視。
Exploits such as email phishing are hard to eliminate as a problem since you can’t really disable emails altogether, and hackers know that. Phishing is also an easier way to get inside a network as opposed to other modern hacks, such as exploiting a zero-day vulnerability.
黑客們自然也心知肚明,由于無法完全禁用所有電子郵件,因此人們很難消除諸如電子郵件欺詐之類的漏洞。 與其他現(xiàn)代黑客(例如,利用零日漏洞)相反,網(wǎng)絡(luò)釣魚是一種進(jìn)入網(wǎng)絡(luò)內(nèi)部的簡(jiǎn)便方法。
Companies today have to always beware of these phishing emails since they only take one wrong click by someone with access to admin credentials on a network to open a backdoor that allows malicious actors to get in, take control, and corrupt the company’s network.
如今,公司必須時(shí)刻警惕這些釣魚郵件,因?yàn)樗麄円坏┦д`點(diǎn)擊就可以為入侵者打開后門,讓黑客隨意進(jìn)入網(wǎng)絡(luò)內(nèi)部,從而控制和破壞公司網(wǎng)絡(luò)。
The problem that most experts face is that there is no one solution to stop phishing attacks from succeeding. At the end of the day, these attacks can boil down to a reckless click, human error, and lack of knowledge.
大多數(shù)專家面臨的問題是,沒有一個(gè)解決方案可以阻止釣魚攻擊的成功。最后,這些攻擊被歸結(jié)為盲目點(diǎn)擊、人為錯(cuò)誤和缺乏專業(yè)性知識(shí)。
Blocking downloads without confirmation, assessing the email before opening any links directly, and using anti-malware and anti-spyware software to block or monitor potential malicious activities could help you mitigate the harm but not necessarily prevent it entirely.
在未經(jīng)確認(rèn)的情況下阻止下載,在直接打開任何鏈接之前對(duì)郵件進(jìn)行預(yù)判,以及使用反惡意軟件和反間諜軟件來屏蔽和監(jiān)控潛在的惡意活動(dòng),這些都能幫助你減輕危害,卻不一定能完全阻止危害。
A. I. and ML Based Cybersecurity Vulnerabilities Can’t be Ignored 基于人工智能和機(jī)器學(xué)習(xí)的漏洞不容小覷
As the Machine Learning and Artificial Intelligence market grow, their application in different business operations, systems, and infrastructure will be a challenge to overcome. These technologies are incredibly resource-intensive and will require significant efforts to make them secure against potential attacks.
隨著機(jī)器學(xué)習(xí)和人工智能市場(chǎng)的發(fā)展,在不同的業(yè)務(wù)操作、系統(tǒng)和基礎(chǔ)設(shè)施中的應(yīng)用將會(huì)成為亟待解決的挑戰(zhàn)問題。這些資源密集型技術(shù)需要付出巨大努力來保護(hù)它們免受潛在攻擊的攻擊。
AI and ML-based devices and software have to be trained with the help of data, and experts will have to keep a keen eye on the kind of data that is being used. Data duping to corrupt the learning process of the Machine Learning algorithm can be injected to hamper the training process.
人工智能和基于機(jī)器學(xué)習(xí)的設(shè)備和軟件必須在數(shù)據(jù)的幫助下進(jìn)行培訓(xùn),專家必須密切關(guān)注正在使用的數(shù)據(jù)類型。虛假數(shù)據(jù)破壞了機(jī)器學(xué)習(xí)的算法,同時(shí),這種數(shù)據(jù)的“注入”也會(huì)阻礙“訓(xùn)練”過程。
This can lead to the algorithm working seemingly fine but producing wrong results, which could, in the case of analytical products and applications, cost businesses millions of dollars.
這會(huì)導(dǎo)致算法看似運(yùn)行穩(wěn)定,但卻會(huì)產(chǎn)生差強(qiáng)人意的結(jié)果,在分析產(chǎn)品和應(yīng)用程序的情況下,這可能會(huì)讓企業(yè)損失數(shù)百萬美元。
How experts monitor and analyze the data will play a crucial part in the future of A.I and ML since the data set being used can be a security vulnerability that will have to be dealt with.
專家監(jiān)測(cè)和分析指出,未來,數(shù)據(jù)對(duì)于人工智能和機(jī)器學(xué)習(xí)技術(shù)至關(guān)重要,因?yàn)樗褂玫臄?shù)據(jù)集也是必須解決的安全漏洞。
In the current climate, this is a less severe issue due to A.I and ML operating in specialized environments, but once businesses begin to scale these processes, there are bound to be vulnerabilities.
在當(dāng)今的形勢(shì)下,由于人工智能和機(jī)器學(xué)習(xí)是在封閉的環(huán)境中運(yùn)行的,所以數(shù)據(jù)漏洞問題并不會(huì)經(jīng)常出現(xiàn)。但是一旦在商業(yè)領(lǐng)域中開始擴(kuò)展某些數(shù)據(jù)程序,那就一定會(huì)出現(xiàn)漏洞。
When processes such as threat analysis and data review become completely automated, malicious actors could exploit these processes to misguide companies and manipulate results without any obviously apparent problems. Furthermore, the technology itself can be used to discover new vulnerabilities, breakthrough security measures, and tools, and penetrate systems through the same algorithm that is being used to protect networks.
當(dāng)類似威脅分析和數(shù)據(jù)審查實(shí)現(xiàn)自動(dòng)化時(shí),黑客就可以利用這些程序誤導(dǎo)公司,從而產(chǎn)生錯(cuò)誤的算法,且不會(huì)暴露出任何蜘絲馬跡。此外,該技術(shù)本身可以用于發(fā)現(xiàn)新的漏洞、研發(fā)突破性的安全措施,并通過用于保護(hù)網(wǎng)絡(luò)的相同算法滲透到系統(tǒng)中。
California Consumer Protection Act(CCPA) Is Now In Effect. 《加州消費(fèi)者隱私法》現(xiàn)已生效
The California Consumer Privacy Act can be considered California’s GDPR. It became active from January 1, 2020, pushing the world of business in a new direction, with more accountability measures being ensured to re-establish the lost trust between consumers and companies. A company to client relationships in these cases was and still is dependent on the sharing of personal information for better and more targeted services, something that lawmakers think has been misused.
《加州消費(fèi)者隱私法》可以被視作加州的《通用數(shù)據(jù)保護(hù)條例》。它從2020年1月1日開始實(shí)施,使商業(yè)世界走向一個(gè)新的方向,推出了更多的問責(zé)措施,重新建立起消費(fèi)者和企業(yè)之間失去的信任。在這些案件中,公司和客戶之間的關(guān)系過去和現(xiàn)在仍然依賴于共享個(gè)人信息,用以獲得更好、更有針對(duì)性的服務(wù),但議員們卻認(rèn)為這種做法被濫用了。
The bill established new consumer rights relating to the access, deletion, and sharing of personal information that businesses collect from their users. If your business is collecting user information, under CCPA, your business has to provide a reason as to why you’re collecting this information, what this information is, how you will use this information, and guide users through the process of deleting that information from your database, if they choose to do so.
該法案明確了涉及到企業(yè)從用戶那里收集到的個(gè)人信息的訪問、刪除和共享的消費(fèi)者權(quán)利。如果你的業(yè)務(wù)是收集用戶信息,根據(jù)加州消費(fèi)者隱私法,你需要提供一個(gè)合法理由,為什么你要收集這些信息,這些信息是什么,你將如何使用這個(gè)信息,如果用戶選擇拒絕提供這些個(gè)人信息,那企業(yè)需要指導(dǎo)用戶完成通過數(shù)據(jù)庫(kù)刪除這些信息。
The concerns with regards to cybersecurity and data protection became news after the claim of Huawei’s 5g technology being a possible threat of the security that resulted in the US government banning all US businesses from dealing with the Chinese tech giants.
在華為5G技術(shù)被指控可能會(huì)對(duì)信息安全造成威脅后,人們對(duì)網(wǎng)絡(luò)安全和數(shù)據(jù)保護(hù)問題的擔(dān)憂登上熱搜,這導(dǎo)致了美國(guó)政府禁止所有美國(guó)企業(yè)與中國(guó)科技巨頭進(jìn)行商業(yè)合作。
In such a world, the burden on Tech companies to ensure maximum data protection came into a significant highlight, with more and more people pushing for stricter regulations and demanding accountability from service providers to ensure that the data of their customers are in safe hands.
當(dāng)今世界,越來越多的人要求更為嚴(yán)格的監(jiān)管,要求服務(wù)商確??蛻舻臄?shù)據(jù)安然無恙,并保證最大程度的數(shù)據(jù)保護(hù),這成為科技公司的重中之重。
The CCPA enforces businesses to implement a process that allows them to obtain the consent of a parent or a guardian and the minor if they’re between the age of 13 and 16 to collect and share their data for the business’ purposes.
《加州消費(fèi)者隱私法》強(qiáng)制企業(yè)執(zhí)行一項(xiàng)程序,要求企業(yè)獲得父母或監(jiān)護(hù)人以及未成年人(如果他們的年齡在13到16歲之間)的同意,以收集和共享他們的數(shù)據(jù)。
This comes with the additional “Right to Say No to Sale of Personal Information” which is to be provided through a web link on the homepage of a business’ website that redirects users to a page where they can opt-out their consent protecting their data and personal information from being sold by the business legally.
附加條款:“拒絕出售個(gè)人信息權(quán)”,此條款規(guī)定,商業(yè)網(wǎng)站須在其主頁(yè)設(shè)置網(wǎng)頁(yè)告示,從而告如若網(wǎng)站業(yè)務(wù)有泄漏個(gè)人隱私數(shù)據(jù)的風(fēng)險(xiǎn)時(shí),消費(fèi)者有合法的權(quán)利拒絕其網(wǎng)站提供的業(yè)務(wù)。
Businesses and Companies are required to update their respective privacy policies with the newly required information, including but not limited to the description of California residents’ rights.
企業(yè)和公司被要求用新要求的信息更新各自的隱私政策,包括但不限于對(duì)加州居民權(quán)利的描述。
While these are the more straightforward laws that are placed within the CCPA to ensure privacy protection and data protection, another measure the CCPA takes is to ask businesses to avoid sending opt-in requests to residents who have opted out of the option for a period of 12 months.
然而這些更為直截了當(dāng)?shù)姆?,是為確保隱私保護(hù)和數(shù)據(jù)保護(hù)而制定的,但加州消費(fèi)者隱私法采取的另一項(xiàng)措施是,要求企業(yè)避免向那些在12個(gè)月內(nèi)選擇退出該選項(xiàng)的居民發(fā)出申請(qǐng)。
The used terminology, which is “avoid” while does leave a gray area for businesses to use, it takes into account that business activities mainly revolve around data gathering, in the absence of which companies cannot promote specific deals or show ads, for which a 12 month mandatory waiting period could be detrimental to the functioning of the business.
這里使用的術(shù)語是“避免”。確實(shí)給企業(yè)留下了灰色地帶,考慮到商業(yè)活動(dòng)主要圍繞數(shù)據(jù)收集進(jìn)行,如果沒有這些數(shù)據(jù),公司就無法推廣具體的交易或投放廣告,而12個(gè)月的強(qiáng)制性等待期可能不利于企業(yè)的運(yùn)作。
The power of GDPR can be seen through the European Union’s 1.5 Billion Euro fine for anti-trust AdSense advertising. This fine, which was levied in 2019, brought the overall EU anti-trust bill to 8.2 Billion Euros. GDPR expects companies to use data responsibly and its breach weighs significant financial damage to businesses, creating a force that ensures that companies adopt the best data protection, regulation, and use policies.
從歐盟對(duì)反壟斷Adsense廣告的15億歐元罰款就可以看出《通用數(shù)據(jù)保護(hù)條例》的影響力,這一判罰于2019年生效,并使歐盟反壟斷法案的總金額達(dá)到82億歐元。《通用數(shù)據(jù)保護(hù)條例》希望企業(yè)合理合法地使用用戶數(shù)據(jù),而且如果企業(yè)違反該法例將會(huì)對(duì)其進(jìn)行嚴(yán)重的財(cái)務(wù)處罰,從而強(qiáng)制確保企業(yè)對(duì)數(shù)據(jù)采取強(qiáng)而有力地保護(hù)、監(jiān)管和使用措施。
CCPA is a similar force, being in effect from the beginning of the year. It expects businesses in California to adopt the best security practices and comply with the regulations set to protect consumers.
《加州消費(fèi)者保護(hù)法》與其相似,并從2020年年初開始生效,它有望通過采取最有效的安全措施,使加州企業(yè)遵守保護(hù)消費(fèi)者的規(guī)定。
For businesses based in California, transitioning to CCPA compliance is crucial, and it has to be done as soon as possible, to limit the potential fines that might be coming their way. For businesses that are not California-based, planning to make this change and implementing it is also crucial. It’s likely that other states such as New York will most likely adopt their own version of the CCPA, even if it is not adopted by the Federal government.
對(duì)于總部位于加州的企業(yè)來說,向加州消費(fèi)者隱私法合規(guī)過渡至關(guān)重要,而且必須盡快完成,以限制可能出現(xiàn)的罰款。對(duì)于非加州的企業(yè)來說,計(jì)劃并實(shí)施這一改變也很關(guān)鍵。即使聯(lián)邦政府不采納加州消費(fèi)者隱私法,向紐約這樣的其他州也極有可能采用他們自己的“加州消費(fèi)者隱私法”。
Hiring security specialists, focusing on compliance, and devoting resources to ensure that there is a successful transition to a post-CCPA world is something that businesses in 2020 should be looking towards.
聘請(qǐng)安全專家,關(guān)注合規(guī)性、投入資源以確保成功過渡到后CCPA時(shí)代,是2020企業(yè)應(yīng)該關(guān)注的事情。
Microsoft and Linux – The future is Cloud 微軟與Linux—云主導(dǎo)未來
The future of Windows seems to be shifting towards a cloud-based platform. Cloud PCs will work similarly to how other cloud-based platforms and services work. Most likely, users will have to pay a subscription to gain access to a pre-set app bundle to run on the PC.
Windows的未來似乎正在轉(zhuǎn)向基于云的平臺(tái),云個(gè)人電腦的工作原理與其他基于云的平臺(tái)和服務(wù)類似。最有可能的是,用戶將不得不支付訂閱,以獲得訪問PC端上預(yù)先設(shè)置的應(yīng)用程序包。
What makes Microsoft more interesting is their adoption of Linux and transitioning towards a Linux-based operating system.
有趣的是,微軟采用了Linux系統(tǒng),并逐步向基于Linux的操作系統(tǒng)進(jìn)行過渡。
Sounds confusing, right? Well, you need to grasp hold of it if you are planning to continue using any resources from Microsoft shortly.
聽起來令人困惑,對(duì)吧?如果你打算在短期內(nèi)繼續(xù)使用微軟的任何資源,你就需要掌握它。
The future of Windows might stay the same on the front-end, with cloud-based PCs providing a similar UI to the Windows OS we’ve grown up accustomed to, but on the back-end, Microsoft might deploy a full-Linux setup.
未來,Windows可能會(huì)在前端保持不變,基于云的PC會(huì)提供一個(gè)類似于我們已經(jīng)習(xí)慣的Windows操作系統(tǒng)的用戶界面,但在后端,微軟可能會(huì)部署一個(gè)完整的linux設(shè)置。
A fulltime Linux setup is happening because most VMs are now running on Linux iterations. Even Microsoft Azure has around 40% of its machines running on Linux at the moment.
由于大多數(shù)虛擬機(jī)現(xiàn)在都在Linux迭代運(yùn)行,完整的Linux部署也在進(jìn)行之中,目前40%的微軟云操作系統(tǒng)也運(yùn)行在Linux上。
There are a few substantial benefits of using on the Back-end, especially for businesses. Here are the benefits:
在后臺(tái)使用有幾個(gè)重要的好處,特別是對(duì)企業(yè)而言。比如:
Migration from an older PC to a new one, its updates, and patches will become easier than before. The service will upgrade the hardware, take care of the updates and release them directly, and deal with migration.
用戶更換新的PC后,更新補(bǔ)丁將比之前更容易。此項(xiàng)維修旨在升級(jí)和更新硬件,并且硬件的發(fā)布較為直接化。
For businesses, Linux is a much better platform for security. Linux is a safer platform for storing sensitive data with only the admins having the root access, helping keeping system vulnerabilities in check.
對(duì)于企業(yè)來說,Linux將是一個(gè)更放心的安全平臺(tái),對(duì)于存儲(chǔ)敏感數(shù)據(jù),Linux更加固若金湯,由于只有管理員具有根訪問權(quán)限,所以這有助于控制系統(tǒng)漏洞。
The service is more likely to adopt a more robust security system than you would on your own hardware, which means that you will gain access to enterprise-grade security, helping you combat the rising threat of cyber-attacks.
該服務(wù)更有可能采用更加強(qiáng)大的安全系統(tǒng),比目前硬件使用用戶的系統(tǒng)更加安全,這意味著你將獲得企業(yè)級(jí)的安全防護(hù),這也會(huì)幫助你對(duì)抗日益增長(zhǎng)的網(wǎng)絡(luò)襲擊的威脅。
For businesses, it is imperative to start investing in robust security infrastructure, and at Tekrevol, we’re trying our hand with some as well.
對(duì)于企業(yè)而言,投資強(qiáng)大的安全信息基礎(chǔ)設(shè)施是非常有必要的,而在Tekrevol,我們也在嘗試類似的安全基礎(chǔ)設(shè)施研發(fā)。
From a security standpoint, Linux is key to OS in the next decade. If you too have a wide range of OS applicability critical to your internal systems, you really need to know how Linux can make your security more concrete.
從安全的角度來看,Linux是未來十年操作系統(tǒng)的關(guān)鍵,如果操作系統(tǒng)的可適用性對(duì)您個(gè)人網(wǎng)絡(luò)系統(tǒng)的使用具有較為重要的影響,那么您確實(shí)需要了解Linux具體是如何確保你網(wǎng)絡(luò)系統(tǒng)的安全性。
How Will Cybersecurity Trends Impact Business strategy? 網(wǎng)絡(luò)安全趨勢(shì)如何影響商業(yè)部署?
According to one study by Accenture, 68% of business leaders think that there is an increased risk of a cyber-attack on their business. The year 2020 will be one where tackling these threats will become a primary focus of business leaders and entrepreneurs.
根據(jù)埃森哲的研究表明,68%的商業(yè)高管認(rèn)為他們的企業(yè)遭受網(wǎng)絡(luò)攻擊的風(fēng)險(xiǎn)增加了。到2020年,商界精英和企業(yè)家的首要任務(wù)將是應(yīng)對(duì)這些麻煩事。
Combating this problem will require these leaders to acquire more knowledge, skills, and tools to improve their organization’s security protocols. Protocols includes network protection and data protection against possible breaches.
解決這個(gè)問題需要領(lǐng)導(dǎo)者獲得更多的知識(shí)儲(chǔ)備、技能和工具來改進(jìn)他們組織的安全協(xié)議。協(xié)議包括網(wǎng)絡(luò)保護(hù)和數(shù)據(jù)保護(hù),以防止?jié)撛谛缘牡木W(wǎng)絡(luò)入侵。
We can expect an increased demand for network security specialists, ML design security specialists, and system security experts. In general, the demand for security specialists across technologies will also increase.
我們預(yù)料到對(duì)于網(wǎng)絡(luò)安全專家,機(jī)器在線設(shè)計(jì)安全專家和系統(tǒng)安全專家的需求將會(huì)增加。一般而言,對(duì)跨技術(shù)的安全專家的需求也會(huì)增加。
Businesses will have to incorporate new risk assessment models for technologies such as IoT, 5G, and AI-based products.
企業(yè)必須為物聯(lián)網(wǎng),5G和基于人工智能的產(chǎn)品等技術(shù)將引入新的風(fēng)險(xiǎn)評(píng)估模型。
According to Gartner’s press release, cybersecurity risk is one of the top concerns that chief audit executives have with regards to their businesses.
據(jù)高德納分析,網(wǎng)絡(luò)安全風(fēng)險(xiǎn)是首席審計(jì)執(zhí)行官最關(guān)心的業(yè)務(wù)之一。
In 2020, businesses will come to a tipping point where they will either develop strategies and technologies that help combat the risk of cyber vulnerability, or the lack of evolution will hurt their performance in the market.
到2020年,企業(yè)將到達(dá)一個(gè)臨界點(diǎn),要么開發(fā)出低于網(wǎng)絡(luò)脆弱性風(fēng)險(xiǎn)的戰(zhàn)略和技術(shù),要么落后,但這將損害他們?cè)诟髯允袌?chǎng)上的業(yè)績(jī)。
Similarly, one can foresee big corporations acquiring digital security startups for record-high acquisitions to keep up with this rising threat.
同樣,我們可以預(yù)知到,為了解決這種日益增長(zhǎng)的威脅,大公司收購(gòu)數(shù)字安全初創(chuàng)公司的交易將創(chuàng)下歷史新高。
How businesses achieve compliance with government regulations and establish strict security protocols with regards to modern tech will define their success in the year 2020. So, if you’re a business owner looking to scale, transferring your focus towards establishing a robust security infrastructure has to be a central part of your business strategy.
到2020年,如何遵守政府法規(guī)并建立嚴(yán)格的現(xiàn)代技術(shù)安全協(xié)議將是決定企業(yè)成功的關(guān)鍵。因此,如果你是一個(gè)希望擴(kuò)大規(guī)模的企業(yè)家,你業(yè)務(wù)的核心部分必須轉(zhuǎn)移到建立強(qiáng)壯的安全基礎(chǔ)設(shè)施。
Wrapping Things Up: 編后按
The future is digital, there is no denying it but simply focusing on the possible benefits isn’t going to cut it. For businesses, it is crucial to realize their responsibility towards consumers and take the necessary steps to ensure data protection and other cybersecurity avenues.
數(shù)字化未來是毋庸置疑的,但僅僅關(guān)注潛在便益并不能解決問題。對(duì)于企業(yè)來說,重要的是意識(shí)到自己對(duì)消費(fèi)者的責(zé)任,并采取必要的措施來確保數(shù)據(jù)安全和其他網(wǎng)絡(luò)渠道的安全。
It is also vital for them to focus strongly on the security of their own platforms, services, and products to ensure that the adoption of modern technology drives positive results. The technologies we’ve talked about have great potential, but the journey into the world of technology requires avid preparation to ensure security and safety.
同樣重要的是,它們必須高度關(guān)注自身平臺(tái)、服務(wù)和產(chǎn)品的安全性,以保證采用現(xiàn)代技術(shù)能夠帶來良好的成效。我們所談?wù)摰募夹g(shù)具有巨大的潛力,但是向科技世界發(fā)展的過程中需要我們做足充分準(zhǔn)備,確保信息安全。
Businesses today have to invest more into optimizing their security, create new strategies, implement new infrastructure, and leverage modern tools to ensure that they are ahead of the and ready to fight any cyber-threats that may come their way.
當(dāng)今的企業(yè)必須投入更多資金來優(yōu)化網(wǎng)絡(luò)安全工作,創(chuàng)新網(wǎng)絡(luò)安防戰(zhàn)略,投用新的網(wǎng)絡(luò)基礎(chǔ)架構(gòu),利用現(xiàn)代工具來確保他們處于領(lǐng)先地位,并準(zhǔn)備好應(yīng)對(duì)任何可能出現(xiàn)的網(wǎng)絡(luò)威脅。
?
注:《網(wǎng)絡(luò)安全:集現(xiàn)代技術(shù)和商業(yè)威脅為一體》來源于Readwrite網(wǎng)站(點(diǎn)擊查看原文)。本文系數(shù)據(jù)觀原創(chuàng)編譯,譯者數(shù)據(jù)觀/張青青,轉(zhuǎn)載請(qǐng)務(wù)必注明譯者和來源。
責(zé)任編輯:張薇