Skip to content

Cyber Risks to Watch in 2020

The start of a new year is a great time to take stock and evaluate our habits. Cyber security for business depends on everyone being aware of the threats out there and a well informed staff is your best chance of preventing a cyber security breach.

Over 28 million Canadians were affected by a data breach in 2019, with 680 data breaches being reported to the Office of the Privacy Commissioner of Canada. In addition, the average cost of a data breach for a Canadian business was nearly $6 million. The 2019 calendar year saw record-breaking penalties across the U.S. and Europe for not having robust cyber security arrangements, totaling nearly $2 billion in fines. Notably, the organizations fined were not necessarily victims of security breaches, but were instead found to be compromised by their respective government regulators.

By implementing extensive cyber security practices across your organization, you reduce the chances of becoming victim to cyber attacks and incurring the resulting monetary loss, public backlash and government scrutiny.

The 5 Biggest Threats Expected in 2020

  1. Targeted ransomware—Ransomware has become increasingly targeted toward specific businesses and industries, particularly toward government and health care organizations.
  2. Phishing—Phishing has become much more common in the last year, and has even spread from primarily using email systems toward including SMS and other messaging systems.
  3. Mobile malware—2019 saw an increase in attacks by mobile banking malware designed to steal payment data, credentials and funds.
  4. Internet of things (IoT) attacks—With the spread of 5G comes new devices connected to the IoT. Each new device connected to the IoT represents another possible entry point for a security breach.
  5. Internal attacks—One of the most dangerous sources of cyber-attacks on organizations comes from inside the organization itself. Employees with access to important data may cause a great deal of harm if they decide to abuse their access for personal gain, or if they accidentally allow their access to be compromised by attackers.


Scroll To Top