Cyber Security – A lot can happen in 10 years

Prosperity 24/7 are one of the sponsors of the Channel Islands Cyber Security Conference. Stephanie Fox, Head of Security Solutions reflects on 10 years since the first conference and what has happened in the past decade.

This year’s Channel Island Cyber Security Conference marks 10 years since it’s official launch in 2014. The conference is an opportunity for business leaders and security professionals to come together to discuss the latest Cyber security risks that are facing our islands.  I attended the first one in 2014 and will again this year as a representative of one of the sponsors – Prosperity 24/7.

A lot can happen in 10 years of cyber security conference subject matter, which got me thinking about the technological advances of the past decade and the impact it has had on Cyber Security. What have we learned as we think about tackling these issues in the future?


Bandwidth and Introduction of 4/5G Networks

Bandwidth costs for organisations were higher in 2014, so businesses focused on ensuring bandwidth was utilised for core activities only. The introduction of fibre and 4G/5G networks was a game changer.  It was no longer prohibitive, opening up new innovative ways of connecting with others, including providing a greater reach for attackers.

Cloud Computing

The rise of cloud computing – to some extent coupled with Bandwidth and 4G/5G improvements and the Covid-19 pandemic, accelerated the need for businesses to to support remote working and therefore migrate to the cloud.  The speed of adoption was intense, with all parties including security professionals, racing to catch-up.  Boundaries blurring and governance no longer contained within a fixed perimeter created new risks.  Improvements in identity verification came higher on the agenda; and new geographical laws and regulations were introduced – all introducing new ways threat actors could exploit businesses and their workforce.

Blockchain and Cryptocurrency

an attacker’s currency of choice!  Many attackers opt to use this currency for ransomware attacks.  It provides a high degree of anonymity, creating an avenue for attackers to conduct their financial affairs associated with their attack campaigns.

AI and machine learning

has accelerated by our continuing desire to automate and innovate ensuring we are more productive and providing growth.  Microsoft CoPilot and ChatGPT have introduced a new way of working, harnessing the power of Generative AI to maximise efficiencies.  Clearly intended for the greater good, but like any new technology it can be exploited to create destruction, educating threat actors, and giving them scale and a faster pace to deploy their attacks.

Regulations & Laws

as the digital landscape has changed over the years, so has the need to regulate and impose laws to make organisations and individuals accountable.  Within the EU alone, there are five major laws which reference Cyber specifically, providing a means or recourse for hackers and organisations/individuals should they be acting outside of these laws.

And what’s next?  Will AI change the digital world in which we operate?  Will new Regulations & Laws improve our security and make us more resilient?

This chapter has yet to be written, but will no doubt have a profound impact in our digital and cyber space.

New technologies and threats should never be viewed in isolation, but they must be viewed at a holistic level, joining the dots of interconnectivity, in a bid to stay ahead of the increased level of Cyber Threats that continue to evolve.  While we have witnessed an increase in products and services in Cyber Security to aid our protection and awareness, this is compounded by the increased level of sophistication of the bad actors that are operating now and in the future.

History and experience have taught me that that nothing stands still, and we must use our own personal experiences and the experiences of others to continue to educate ourselves and to remain vigilant.

Find out more about our Security Solutions

 

This article first appeared in the October 2025 edition of Connect Magazine