Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Is the World Economic Forum's prediction of a global cybersecurity failure in the next 10 years avoidable?

By Shira Rubinoff
cyber freepik
March 11, 2021

What began just a few years ago as an organic, gradual, and sometimes cautious migration of communications, operations, and data to the virtual world of online storage and operations, has accelerated exponentially, due to the worldwide pandemic. Even those corporations, which took decidedly measured or even reluctant approaches to the early migrational patterns, were forced to forgo any misgivings or operational realities in their blind leap to accommodate the new realities imposed by COVID.

The seemingly overnight transformation from office-based activity to remote work across the globe, now screams for the adoption of robust cybersecurity protocols, and is more critical and time-sensitive than ever before.

This unprecedented paradigm shift was inevitable in mitigating the spread of the physical virus, but in doing so, has left many corporations vulnerable to viruses of an electronic nature, such as malware and ransomware. The World Economic Forum's Global Risk Report for 2021 placed cybersecurity failure among the greatest threats facing humanity within the next ten years. Clearly, in this climate, and since many jumped into the world of cyber operations without adequate preparation, cybersecurity is now a critical priority.

Cybersecurity attacks are increasing in frequency and sophistication, with businesses attacked by ransomware every 11 seconds. The consequences of a cyberattack can be devastating. Many small-to-medium-sized businesses do not have the resources to recover from a data breach or ransomware attack, with a sobering 60% going out of business within six months. An attack on a hospital can be particularly calamitous, even leading to death. Regardless of the type of enterprise, enduring a cyberattack is prohibitively expensive.  An alarming $6 trillion in damages is predicted for 2021. That amount represents the largest transfer of economic wealth in history—more profitable than the trade of all major illegal drugs combined, and would make cyberattacks the third largest economy, after the U.S. and China, if it were grouped as a country.

The situation is not forecasted to improve, unless deliberate and sustained action is taken - swiftly and broadly. Cybercrime costs are expected to reach a staggering $10.5 trillion per year by 2025 - just around the corner!  According to AT&T's cybersecurity insights guide for CEOs, "50% of organizations haven’t updated their security strategy in 3+ years." Their lack of action will be costly, especially as cyber criminals continue to iterate new strategies to keep up with evolving security innovations. The AT&T guide for CEOs recommends that enterprises identify and assess risk areas across applications, devices and people, perform threat analyses to automate responses to abnormal activity, adapt systems that allow for issues to be resolved remotely, and create action plans so that all relevant parties are empowered to respond effectively when facing a breach.

Though all of these strategies are essential for cyberattack preparedness, there is a greater issue at play, which renders most cloud systems vulnerable: single points of failure. As long as data is stored on centralized databases, all a hacker needs to do is break through the security measures. Even with the implementation of some of the more familiar protections—two-factor authentication, anti-virus software, API security, threat-detection software, etc.—data stored on central databases is vulnerable to breach. 

Organizations must also consider the architecture and storage needs when beginning to build solutions to leverage containers for greater flexibility and agility. Business teams must engage their storage counterparts early in the planning phases, and storage teams ought to keep abreast of the business side of things so that they may effectively chart appropriate courses with adequate storage capacity as transformation occurs. While businesses have yet to return to pre-COVID capacity, and indeed may never fully do so, criminal elements are still hard at work. It is not enough to provide enough storage space; it is crucial to secure it.

KEYWORDS: cyber security information security ransomware remote work risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Shira Rubinoff, Advisor at HeraSoft, is a cybersecurity executive, speaker, and influencer, who has built two cybersecurity product companies, and led multiple women-in-technology efforts. She currently serves as President of social-media-security firm SecureMySocial and President of the New York-based technology incubator Prime Tech Partners. Shira also sits on the boards of the Executive Women's Forum for Information Security and Leading Women in Technology, blockchain company Mainframe, as well as AI-powered company TrueConnect. Shira is considered an expert in the Human Factors of information technology and cybersecurity and has been calculated by analysts to be the top female cybersecurity influencer on social media worldwide.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • digital-cyber

    World Economic Forum ranks cybersecurity failure as a significant global risk

    See More
  • TrendMicroCRI

    80% of global businesses expect a breach of customer records in the next year

    See More
  • Only 30 Percent of Firms are Confident They Can Avoid a Major Security Event in the Next Two Years

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150952519X.jpg

    Intelligence in An Insecure World, 3rd Edition

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing