3 Cyber Security Trends Tech Pros Need to Know

illustration of computer screen with a padlock badge

New stories about major data breaches and cyber attacks seem to pop up daily, and it’s clear that cyber crime is a much more serious topic than jokes about Nigerian prince email scams would seem to let on. With millions in damages accruing and billions of sensitive records potentially being exposed, there’s clearly a lot at stake.

Perhaps even more concerning, however, is that cyber criminals are constantly looking for ways to evade the security measures used to stop them. All of this might have you considering a life off the grid, but the optimist in you knows that opportunity knocks when problems arise.

But before we get into the silver lining, let’s take a closer look at some of the high-profile developments in cyber crime and attacks in recent years.

3 Trends cyber security professionals should know

Looking to get a pulse on the latest happenings in the cyber security world? Look no further. Learn more about three trends worth paying attention to.

1. A focus being placed on governmental targets

Cyber attacks aren’t just a concern for banks and other large businesses—they’re also a fact of life for government agencies and the contractors that work closely with them.

In May 2019, a contractor of the U.S. Customs and Border Protection agency, Perceptics, was compromised by hackers. This surveillance company’s security lapse left sensitive information about their hardware and approximately 100,000 facial recognition photos and license plates exposed and posted to the dark web.

Another prominent example occurred in August 2019, as 22 small towns in Texas were hit by a coordinated ransomware attack, temporarily crippling some government departments’ ability to process utility payments or access important records.

These are just two examples of many. Little is known about the motivations behind these attacks as authorities continue to investigate—some could be the work of state-sponsored hackers while others could just be opportunists seeking out valuable targets with less-developed defenses. No matter the motivation, know that it’s not just businesses that are at risk, and money isn’t the only motivator for cyber crime.

2. Software supply chain attacks are on the rise

One of the most recognizable vehicles of cyber attack are those suspicious looking phishing emails. You know the ones—your bank wants you to “confirm your account information,” or you were selected to “claim a prize.” Email providers and businesses have developed a variety of security filters and systems to help combat the surprisingly effective scourge of phishing emails in recent years, but they still remain an issue.

But like a virus that adapts to its antibiotic, cyber crime has evolved. One recent development has seen hackers working further up the “software supply chain” to create more effective and widespread avenues of intrusion.

If sending a phish-y email to a batch of employees is toward the end of the chain, then going back to the installation or update of a software is toward the beginning. The idea is that since direct contact is becoming such a recognized method, hackers are embedding malware in a more trusted vehicle—like a company-wide software update. This method of attack is called a “software supply chain attack” and these attacks can be devastating.

One of the most famous examples of this comes from 2017 when a group of what’s believed to be Russian hackers infiltrated a popular piece of Ukrainian accounting software, which was used to then spread a data-destroying malware called NotPetya.

In more recent news, ASUS acknowledged a massive supply chain attack. A server used for the company’s Live Update tool was compromised and then used to push malware on almost 1 million customers. To the end users, this malware just looked like a routine software update.

Not only are cyber criminals zeroing in on new targets, but they are finding new ways to make their attacks effective.

3. Companies are investing more in cyber security professionals

With the rise of cyber crime, the need for expert cyber security professionals has also skyrocketed. The position of Chief Information Security Officer (CISO) has become one of the more sought-after and lucrative positions in many companies. Unfortunately, there do not seem to be enough qualified candidates to go around.

One 2018 report estimates there will be 3.5 million unfilled cyber security job openings from 2018 through 2021.1 While schools and organizations are clearly working to train employees to meet this need for cyber security professionals at all levels, experienced workers with top-level expertise aren’t easy to find. As a result, companies are placing a premium on attracting talent. According to a Bloomberg News article, a top firm offered an annual salary of $650,000 to attract a chief information security officer.2 At the time, this figure was about as lucrative as it gets, but now the stakes are higher as Bloomberg reports some companies are willing to offer as much as $6.5 million in compensation to keep a cyber security expert around.2 It’s true these compensation figures are not the norm for rank-and-file cyber security professionals, but it does illustrate a significant shift in priorities for some organizations.

While this may seem like an enormous amount of money, the financial damage from information security failures can be potentially spectacular as well.

Marriott International paid $126 million for a 2018 breach on one of their reservation databases. Equifax paid $700 million in 2017 toward settlements for a breach to sensitive customer data. Cyber attacks like this can costs exponentially more in lawsuits, stock prices and damage to public reputation. A Herjavec Group report predicts cyber crime to cost the global economy $6 trillion by 2021—making it one of the greatest economic and political threats worldwide.3

Getting started in cyber security

Information security is clearly growing in importance for many organizations, and these cyber security trends might have you wondering what it takes to get started in this field. Given that the discipline of cyber security is relatively new, employer requirements for these positions aren’t often uniform. That being said, our analysis of over 153,000 cyber security job postings found that 88 percent were seeking candidates with a Bachelor’s degree or higher.4 This analysis also found these roles were typically seeking experienced candidates, with 67 percent of job postings looking for candidates with 3 to 8 years of relevant experience.4

Many information security professionals start out in more generalized information technology roles while learning the ins-and-outs of network and systems administration before branching out into roles more strictly focused on information security. For those who already have a solid IT career started with an Associate’s degree but lack the education level employers prefer, a Cyber Security Bachelor’s degree can help for reaching employers’ desired mix of experience and education. 

Is a cyber security career in your future?

Keeping up on cyber security news and trends can certainly be a mixed-bag. Threats are evolving and the potential risks can be downright scary. But with pressing concerns come a pressing need for qualified cyber security professionals to help keep these threats at bay and any potential damage minimized. If you’re considering a career in cyber security, check out our article, “8 Signs You’re Wired for Working in a Cyber Security Career” to get a better idea of whether or not you’re a natural fit.

1Herjavec Group, Cyber Security Jobs Report 2018-2021 Edition, [accessed September 2019] https://www.herjavecgroup.com/wp-content/uploads/2018/11/HG-and-CV-Cybersecurity-Jobs-Report-2018.pdf
2Bloomberg News, Bloomberg Cybersecurity, Cybersecurity Pros Name Their Price as Hacker Attacks Swell, [accessed September 2019] https://www.bloomberg.com/news/articles/2019-08-07/cybersecurity-pros-name-their-price-as-hacker-attacks-multiply
3Herjavec Group, The 2019 Official Annual Cybercrime Report, [accessed September 2019] https://www.herjavecgroup.com/the-2019-official-annual-cybercrime-report/
4Burning-Glass.com (analysis of 153,516 cyber security job postings, September 1, 2018 – August 31, 2019)

About the author

Hannah Meinke

Hannah Meinke is a writer at Collegis Education. She enjoys helping people discover their purpose and passion by crafting education and career-related content on behalf of Rasmussen University.

hannah meinke headshot

Related Content

Related Content

This piece of ad content was created by Rasmussen University to support its educational programs. Rasmussen University may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen University does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen University is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

logo-accreditation-acen logo-accreditation-ccne chart-credential-laddering-associates-bachelors-masters 0 Credits 90 Credits 180 Credits 48 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE Start Here MASTER'S DEGREE PURSUERS End Here BACHELOR'S DEGREE End Here MASTER'S DEGREE chart-credential-laddering-associates-bachelors 0 Credits Start Here HIGH SCHOOL GRADS Start Here TRANSFER STUDENTS 90 Credits Start Here SECOND DEGREE PURSUERS End Here ASSOCIATE'S DEGREE 180 Credits End Here BACHELOR'S DEGREE chart-credential-laddering-msn chart-credential-laddering-nursing-programs chart-credential-laddering-nursing DNP MSN RN to BSN LPN to RN Bridge Accelerated BSN Professional Nursing ADN Practical Nursing Diploma Pre-Licensure Post-Licensure icon-colored-outline-bank icon-colored-outline-certificate icon-colored-outline-circle-dollar-sign icon-colored-outline-folder-search icon-colored-outline-hand-heart icon-colored-outline-head-blocks icon-colored-outline-head-cog icon-colored-outline-head-heart icon-colored-outline-health-plus-leaves icon-colored-outline-hospital icon-colored-outline-lifelong-learning icon-colored-outline-light-bulb-analytics icon-colored-outline-location-pin icon-colored-outline-magnifying-glass icon-colored-outline-monitor-healthcare icon-colored-outline-monitor-paper-search icon-colored-outline-nurse-rays icon-colored-outline-padlock-shield icon-colored-outline-person-presenter-screen icon-colored-outline-scales ras-logo-flame ras-logo-horizontal ras-logo-stacked icon-colored-advance icon-colored-arrows-cross-curve icon-colored-briefcase-star icon-colored-build icon-colored-bulb-analytics icon-colored-certificate icon-colored-continual-development icon-colored-duo-chatbox icon-colored-folder-mortarboard icon-colored-forward-ribbon icon-colored-gears-clock icon-colored-globe-pen icon-colored-growth icon-colored-hand-bubble icon-colored-hand-stars icon-colored-hands-gear icon-colored-head-blocks icon-colored-head-cog icon-colored-health-plus-leaves icon-colored-hospital-building icon-colored-laptop-cbe-skyscraper icon-colored-laptop-checkmark icon-colored-laptop-webpage icon-colored-location-map icon-colored-location-pin icon-colored-monitor-paper-scan icon-colored-mortarboard-dollar icon-colored-national icon-colored-people-chat-bubbles icon-colored-person-cheer-star icon-colored-person-laptop-checkboxes icon-colored-person-screen-instructor icon-colored-person-whiteboard icon-colored-phone-chatbox icon-colored-police-light icon-colored-prep icon-colored-presenter icon-colored-regional icon-colored-save-time icon-colored-shirt-hat icon-colored-skyscraper icon-colored-state icon-colored-student-centered icon-colored-support icon-colored-world-experience icon-triangle-arrow-up-plant icon-triangle-calendar-pencil icon-triangle-clock-rotating-arrows icon-triangle-display-gears icon-triangle-hand-right-speech-bubble icon-triangle-laptop-coding-brackets icon-triangle-mortarboard icon-triangle-paper-ribbon icon-triangle-person-cheer-star icon-triangle-person-juggle icon-triangle-triple-people-chat-bubble icon-modality-campus icon-modality-field icon-modality-online icon-modality-residential icon-arrow icon-bank icon-camera icon-filter icon-general-chart icon-general-connect icon-general-degree icon-general-discuss icon-general-email icon-general-find icon-general-hat icon-general-heart icon-general-laptop-building icon-general-laptop icon-general-leader icon-general-map icon-general-money icon-general-paperwork icon-general-people icon-general-phone icon-general-speak-out icon-head-heart icon-info-circle icon-mail-forward icon-mglass icon-play-solid icon-quote-mark-left icon-quote-mark-right icon-scales icon-share-square-o icon-simple-chat icon-simple-desktop icon-simple-find icon-simple-hamburger icon-simple-phone icon-spinner icon-tag icon-testimonial-quotes icon-util-checkbox-white icon-util-checkbox icon-util-checked-white icon-util-checked icon-util-chevron-down icon-util-chevron-left icon-util-chevron-right icon-util-chevron-up icon-util-circle-arrow-down icon-util-circle-dot icon-util-language-switch icon-util-loading icon-util-open-window-link icon-util-pdf-link icon-util-refresh icon-util-x rebrand-arrows icon-social-facebook-colored icon-social-facebook-square-colored icon-social-facebook-square icon-social-facebook icon-social-google-plus-square icon-social-google-plus icon-social-instagram-colored icon-social-instagram icon-social-linkedin-square-colored icon-social-linkedin-square icon-social-linkedin icon-social-pinterest-p-colored icon-social-pinterest-p icon-social-twitter-colored icon-social-twitter-square icon-social-twitter icon-social-youtube-play-colored icon-social-youtube-play graduate-cap-star-coin hand-coin hand-heart nurse-stethoscope-rays card-send-smile person-yoga-pose suitcase-star