Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

URL has been copied successfully!
Fortifying cyber security: What does secure look like in 2025?
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

The evolving cybersecurity landscape has increased security pressures for IT leaders. With the World Economic Forum estimating, the global cost of cybercrime is projected to reach $10.5trillion annually in 2025, the situation is only escalating[1]. The rise of new technologies, such as Artificial Intelligence (AI), and the complexities introduced by flexible working have made  IT security feel like a constantly moving target. Maintaining information security, is now among the most time-consuming responsibilities for IT leaders, with Canon research finding that 50% rank it as one of their top three concerns[2].The security landscape continues to evolve rapidly, but it’s important in all the discussions around AI powered threats we don’t lose sight of what can often make or break and successful attack the basics.The new AI realityAI is no longer a challenge of the future, it is intensifying attacks today. Its accessibility allows cybercriminals to execute more sophisticated attacks.  This is because AI enables threat actors to develop malware that exploits software vulnerabilities and create phishing attempts using personalisation, deep fakes and auto translation. For example, AI powered scams now leverage localisation and in some cases even audio creation to enhance their impact.Despite these threats, strengthening a business’ first line of defence is its people. Proper training to recognise and report phishing is critical in combating AI powered attacks.Mastering the basicsBasic cybersecurity practices are more vital than ever. A robust foundation can make it harder for AI driven threats to succeed. A significant number of the high-profile incidents in recent years  stemmed from simple vulnerabilities, such as unpatched software. This means companies must prioritise strong  perimeter defence, enforcing multi-factor authentication (MFA), regular updates and security patches, and a robust recovery action plan. Embracing zero-trust principles, such as MFA and least privilege access and enforcing good cyber hygiene is crucial . While MFA and automated updates ensure a secure baseline, educating employees may be the difference between a contained threat and a costly cyber incident.The regulation revolutionGovernments and regulators are stepping up to address cyber resilience.  The European Union’s  NIS2[3] directive requires businesses to meet  cybersecurity standards, while sector specific regulations, like  DORA in the financial sector, calling for robust risk management, resilience testing and incident reporting[4].Standardised procedures foster confidence in third party software and hardware creating a unified cyber framework. This ‘regulation revolution’ is set to intensify in 2025, with the European Union’s Cyber Resilience Act set to come into effect in 2027, alongside continuing conversations around AI regulation.  Businesses must maintain compliance both now and in the long term.Preparing for future threatsThe cybersecurity landscape, as witnessed in 2024, has grown significantly more complex, with AI amplifying the sophistication of cyberattacks. Despite this evolving threat environment, mastering fundamental security principles remains crucial. Organisations that prioritise these foundations  will strengthen their cyber resilience in 2025, positioning themselves to effectively navigate any challenges that arise in the next couple of years. Find out more about Canon’s Information Security Solutions.


[1] WEF_Global_Risks_Report_2023.[2] Canon IT barometer Canon Europe[3]  The NIS2 Directive: A high common level of cybersecurity in the EU | European Parliament[4] Digital Operational Resilience Act (DORA) EIOPA

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3820804/fortifying-cyber-security-what-does-secure-look-like-in-2025.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link