{"id":34428,"date":"2020-04-02T02:31:53","date_gmt":"2020-04-02T06:31:53","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=34428"},"modified":"2022-08-04T10:30:08","modified_gmt":"2022-08-04T14:30:08","slug":"privacy-predictions-2020","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/privacy-predictions-2020\/34428\/","title":{"rendered":"Never the same river: Predictions for privacy&#8217;s next decade"},"content":{"rendered":"<p>Your phone. Your smartwatch. Your smart home. Your data is now everywhere. Collecting personal data makes services better for the user, but over the past decade, multiple cases have demonstrated the risk.<\/p>\n<p>In privacy, you never step in the same river twice. Concerns, threats and priorities are always changing. What privacy hazards will we see in the coming decade, and how should your business prepare?<\/p>\n<h2>1.\u00a0 Governments will allow themselves to access more of citizens\u2019 data<\/h2>\n<p>It\u2019s already happened, but in the next decade, governments around the world will adopt laws that let them access more of citizens\u2019 data.<\/p>\n<p>They may cite many reasons, including terrorism, instability and the already widespread use of the same data by business.<\/p>\n<h2>2.\u00a0 The gap between regulation and the real world will only grow<\/h2>\n<p>While the rationale for it is clear, enhanced access to people\u2019s data carries risks, such as unauthorized access and leaking information.<\/p>\n<p>It will be a big challenge for regulators to keep adapting regulations at the same speed as new technologies come into play. Companies have been slow to change how they\u2019re dealing with user data. The only recent significant change has been asking users to consent to how the company will use their data, now mandatory in many countries. We don\u2019t see any strong trend toward adding security to protect sensitive user data. There\u2019s already a growing gap between regulation and real-world practice, making regulation seem toothless.<\/p>\n<h2>3.\u00a0 Counter-tools will fuel a privacy cyberbattle<\/h2>\n<p>The trends I\u2019ve already mentioned will encourage innovators to develop privacy protection technologies. The tech-savvy will adopt these, and more technologies will arise to circumvent them. It will be a privacy cyberbattle.<\/p>\n<p>Meanwhile, users will become more proactive about their privacy. There\u2019ll be high demand for password managers, virtual private networks (VPNs) and tokens (automatically generated codes) for two-factor authentication (2FA).<\/p>\n<p>However, protection mechanisms like 2FA tokens and password managers are just at the endpoint. Attacks and misuse are often at the backend. These tools protect the local environment, but they don\u2019t protect against attacks and abuse of systems such as the cloud. And as <u><a href=\"https:\/\/www.inc.com\/rebekah-iliff\/7-cloud-based-tools-to-take-your-business-to-the-next-level.html\" target=\"_blank\" rel=\"noopener nofollow\">cloud-based tools go from being <\/a><a href=\"https:\/\/www.inc.com\/rebekah-iliff\/7-cloud-based-tools-to-take-your-business-to-the-next-level.html\" target=\"_blank\" rel=\"noopener nofollow\">leading-edge <\/a><a href=\"https:\/\/www.inc.com\/rebekah-iliff\/7-cloud-based-tools-to-take-your-business-to-the-next-level.html\" target=\"_blank\" rel=\"noopener nofollow\">to indispensab<\/a><a href=\"https:\/\/www.inc.com\/rebekah-iliff\/7-cloud-based-tools-to-take-your-business-to-the-next-level.html\" target=\"_blank\" rel=\"noopener nofollow\">le<\/a><\/u>, all employees will need to understand where the risks are. VPNs protect against some data collection (real IP-addresses, geolocation) but don\u2019t protect against users voluntarily sharing data with services like Google and Facebook.<\/p>\n<h2>4. We\u2019ll keep getting fooled by fun<\/h2>\n<blockquote><p>The enduring popularity of amusing online games, quizzes and applications that make giving out personal information fun for the user shouldn\u2019t be underestimated.<\/p>\n<\/blockquote>\n<p>Cybercriminals can use this strategy to attack businesses, targeting employees for personal information, and using it to access business systems and data.<\/p>\n<h2>5. We\u2019ll see new attacks on democratic process and\u00a0 protections against disinformation<\/h2>\n<p>These attacks have been with us for many years, and there\u2019s no reason for them to stop. Technology for fake visual and audio IDs already exist, and with the political pendulum of a US presidential election, these will bring undesired attention and abuse from multiple parties.<\/p>\n<blockquote><p>But where there is action, there is also reaction \u2013 we can count on new ways to withstand those who wish to manipulate the public.<\/p>\n<\/blockquote>\n<h2>6. Internet of Things (IoT) vendors will scale up security investment<\/h2>\n<p>The last few years have been turbulent for the cybersecurity industry. <u><a href=\"https:\/\/securelist.com\/iot-a-malware-story\/94451\/\" target=\"_blank\" rel=\"noopener\">IoT-specific malware<\/a><\/u>, <u><a href=\"https:\/\/www.cnbc.com\/2019\/07\/30\/five-of-the-biggest-data-breaches-ever.html\" target=\"_blank\" rel=\"noopener nofollow\">data breaches<\/a><\/u> and disinformation campaigns across the globe have all been challenging.<\/p>\n<p>This activity will push vendors to a new level of collaboration for the sake of security. Amazon, Apple, Google and the Zigbee Alliance have announced they\u2019re creating a <u><a href=\"https:\/\/www.apple.com\/newsroom\/2019\/12\/amazon-apple-google-and-the-zigbee-alliance-to-develop-connectivity-standard\/\" target=\"_blank\" rel=\"noopener nofollow\">working group to develop and promote a royalty-free connectivity standard<\/a><\/u>. This will increase compatibility among IoT products and embed fundamental security. I hope others will follow their lead.<\/p>\n<p>All in all, we\u2019re looking at an interesting decade ahead for privacy. The challenges will be significant. Businesses will be a key player in securing the privacy of both their employees\u2019 and customers\u2019 data.<\/p>\n<p>Let\u2019s hope solutions from innovators follow fast on the heels of each new threat. In the meantime, by putting in place adequate, regular privacy training and cyberthreat education for all employees, any business can be part of the solution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In privacy, you never step in the same river twice. Threats and priorities change. What should your business know about privacy\u2019s next decade?<\/p>\n","protected":false},"author":2571,"featured_media":34728,"template":"","coauthors":[3739],"class_list":{"0":"post-34428","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-data-and-privacy","7":"emagazine-category-safer-business","8":"emagazine-category-trends","9":"emagazine-tag-cloud-security","10":"emagazine-tag-data-security","11":"emagazine-tag-democracy","12":"emagazine-tag-internet-of-things","13":"emagazine-tag-predictions","14":"emagazine-tag-privacy"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/privacy-predictions-2020\/34428\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/secure-futures-magazine\/privacy-predictions-2020\/21722\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/secure-futures-magazine\/privacy-predictions-2020\/20045\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/secure-futures-magazine\/privacy-predictions-2020\/20294\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/secure-futures-magazine\/privacy-predictions-2020\/16160\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/34428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/34728"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=34428"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=34428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}