By: Joel Windels
As a technology company that prides itself on building innovative products, it’s important that we stay abreast of the latest trends in the industry. That means not only listening and observing what’s been happening today, but also taking the time to imagine what might be happening tomorrow. With 2018 just days from ending, it’s a good time to take a look at some of the biggest themes we expect to see in 2019. Here we assess some of the most significant developments in the market, offering a handful of predictions and thoughts on how that might change the way we interact with technology.
5G is almost here – but will it deliver?
It’s been on the cusp of the horizon for a few years now, but 2019 is probably – probably – the year that 5G-enabled smartphones mark their first proper entrance. Most of the biggest Android houses in the business have begun to confirm 5G-ready handsets. For example, the Samsung Galaxy S10, Huawei P30, and OnePlus 7 are all scheduled for launch next year. It’s reasonably safe to assume then that by the end of 2019, 5G is going to be well and truly here.
So far, so familiar. The story that hasn’t been told, however, is that the much-hyped speed improvements are unlikely to make as much of a difference to users as some have been promising. Firstly, there’s the simple idea that as soon as capacity improvements are made (in this case, speed), you can bet that developers will quickly move to maximise it. Apps will start by offering certain features that require faster speeds which, as 5G becomes more pervasive, will eventually become a standard piece of functionality – eating up all the gains in speed enhancements. This also happened with 4G. Once high speed connections were widely available, apps like Facebook (autoplay video) and Instagram (Stories) became gradually more and more demanding of bandwidth. Ultimately, from the users’ perspective what will initially seem like lightning fast connectivity will soon become the same-old ‘why won’t this damn thing load?’ once apps start relying on that speed to do whatever it is they do.
The second factor compounding this problem is that for all the greatness of 5G, almost all of its upgrade potential is centered on raw speed. In terms of mobile user experience, it’s actually the reliability of the connection that makes the most significant impact. To make 5G a reality, it’s going to require the installation of millions of ‘stations’ (essentially antennae sending out the 5G signal) all across the country. These signals can only travel up to about 100 metres, so reaching a point of consistently fast connections is going to take years of investment. Once users realise that they’re still going to have to switch between 3G, 4G, WiFi hotspots (it’s in the carrier’s interest to use these) and, of course, 5G, there’s a good chance that the delivery of 5G is going to fall well short of expectations.
Forget apps, it’s networks and people that pose the biggest mobile risk
There’s a common misconception in mobile security, which is that many security leaders fear rogue apps or mobile malware as the biggest threat putting their fleets at risk. In fact, the app store is probably the wrong place to start looking. The industry has been obsessed with apps for so long now, that it’s almost impossible to imagine a threat originating anywhere else. The reality is that Apple, Google and the others have invested all kinds of resource into making this a much less likely risk than in desktop computing, with their closed ecosystems and tightly controlled content delivery systems. So where will the threat come from? The chances are it will either be network-related – it’s much easier to compromise a single WiFi connection than it is to bypass iOS security systems – or that it will be another type of compromise altogether: the user. Phishing, for example, is shifting away from email and towards mobile at an alarming pace. Hackers don’t have to build a malicious version of Messenger or WhatsApp and get users to download it anymore; all they have to do is trick users into giving away credentials by manipulating users on legitimate platforms. I believe that it’s this kind of exploit that lead to a major mobile security event. It’s just that most people seem to be looking in the wrong place for it.
Are we about to experience data fatigue?
Big data is the perfect word for buzzword bingo, and now that every company in the world is claiming to offer it, it’s likely that 2019 becomes the year of data fatigue. Access to reams and reams of data is no longer a challenge for most organisations. Data is beyond plentiful; it’s a deluge.
A few years back everyone was talking about how Big Data would transform enterprises large and small. So, whatever happened? For lots of companies that bit on the Big Data apple, they discovered that their teams were soon submerged in reports and spreadsheets, and in the dashboard of more tools and products that provided yet more access to data.
Amidst that myriad of data there are important insights to be gained, it’s just that finding them can be hard work. In 2019, we’ll see a shift from analysts and business leaders actually demanding less. It’s now on technology companies to find a way to address this. Rather than throw everything they have at their users, vendors must find smart ways to surface only the data that matters, helping customers move from the ‘what’ to the ‘so what’ much faster.
BYOD – the beginning of the end?
The threat of social engineering on mobile is especially difficult to address because it targets people who have legitimate access to the network. Bring your own device (BYOD) and the cloud have made the traditional network perimeter obsolete. This makes it much more difficult for IT teams to track where company data is going and who is using it.
In the age of flexible working, a BYOD policy has been popular in certain sectors. With employees using their own personal devices (mobile phones and laptops) to go about their everyday work, many organizations have adopted BYOD as a way to cut the expense of purchasing devices for all employees. But have these savings put businesses at risk?
The weakest link in an organisation’s security is its endpoint devices. Laptops, mobile phones and other ‘field’ devices are a lucrative target for cyber criminals, and pose a far greater risk than corporate-owned devices operating on corporate-owned networks. As more organisations come to this conclusion, there’s undoubtedly a shift that has already begun back towards a more traditional, corporate-assigned approach to mobile.
So what now for those companies that have already opted for BYOD strategies? Every organization must decide what their tolerance for risk is. Companies in certain sectors might think that the threat of mobile security and data loss incidents is not (yet) great enough to go through the ordeal of bringing BYO in-house, but there has undoubtedly been a trend in the more risk-averse sectors taking that route. One of the more effective ways I’ve seen it done is for a ‘mobile expenses paid’ perk to be replaced with a ‘employee-provided smartphone’ perk – when framed in that light, end-users tend to be more receptive to the idea. As soon as employees realize they either have to start using a corporate-assigned device, or start paying their own phone bills, then that transition becomes a little less painful.
Is IoT the looming threat we think it is?
The Internet of Things (IoT) has greatly changed the way we view, use and interact with smart devices, both in the consumer world and, increasingly, in the business world. Internet-connected virtual assistants, appliances, security systems and much more can all communicate and coordinate with each other, allowing for automation and streamlining of boring and time-consuming activities. However, for all the conveniences that IoT devices afford us, security remains a major concern.
Anything that’s connected to the internet has the potential to be hacked and misused. Very worrying when you consider the amount of personal data that IoT devices collect and use. Must IoT devices run a primitive OS and offer little or no protection against attacks. Exploiting either the device itself or the network it runs on may be enough to gain credentials (even ‘smart’ ovens now require a login!). Those credentials could well be the start of a much more sophisticated and damaging attack on the enterprise – and 2019 could well be the year we see a high profile attack of this nature.
Collectively, these predictions are set against a backdrop of an increasingly connected world. There’s no need for scaremongering, but there certainly are reasons to be careful when embracing the latest technology trends. As we crawl deeper down this one-way rabbit hole of interconnectivity, it’s important we take the time to stop and think: is this the path we want to take?