The Biggest Takeaways from CES 2020


Since its inception in 1967, the Consumer Electronics Show (CES) has become the premier global technology showcase. Each year, CES seems to outdo the previous year’s show with newly presented technologies. Along with technology advances, 2020 was also an incredibly transformative year in cybersecurity. Although cybersecurity is normally a small part of the showcasing at CES, this year, companies discussed the importance of malware prevention, EDR and everything in between. Learn more about the cybersecurity takeaways from CES 2020 below.

Even Cities Need Ransomware Prevention Technology

On the first day of CES 2020, the city of Las Vegas suffered from a cyber-attack. The attack was initiated when a city employee clicked on a malicious link that was included in an email. Luckily, the attack was spotted quickly by the IT staff, which meant that the infiltrated systems were not seriously breached. However, with the correct email security, endpoint security and ransomware prevention, the attack could have been thwarted before the city employee even had a chance to click on the hostile link.

People Care About Cybersecurity More Than Ever

In years past, cybersecurity has been in the second tier of topics at CES. However, this year, cybersecurity was a top-of-mind issue. Thought leaders discussed the ability to hack Teslas and other vehicles - even ones that were over 20 years old. Other speakers discussed hacking government networks and fears such as malicious actors gaining control of planes. In short, thought-leaders stressed the increasing risk of infiltration in everyday technologies at CES 2020. As the threat landscape continues to grow and become more difficult to manage, companies will need to employ ransomware detection, EDR technology and more to ensure they are completely covered.

Companies are Taking Privacy More Seriously

At CES 2020, another major topic was the issue of privacy. Apple hasn’t been to CES in over 25 years but showed up in 2020 to discuss the importance of privacy. Apple, like many companies, wanted consumers and businesses alike to know that users should and will have more control over their data. Like Apple, Google led a conversation explaining features that allow users to easily erase recordings and other sensitive data.

In another session, Ring Inc., a home security company, addressed recent backlash after a hacker compromised user accounts. Ring Inc. used CES 2020 as a way to reassure users that they are working constantly to create dashboards and extra security protocols to prevent the exposure of user data. Enterprises realize that individuals, now more than ever, are concerned with privacy and the misuse of their data. To make sure data breaches aren’t a possibility, companies are making it standard to have the best endpoint security and ransomware prevention technologies on the market.

5G is Going to Change Industries

This year at CES, 5G technology was also top of mind, as companies race to provide national coverage. As many discussed, 5G will change the way industries operate. For example, Christian Tesimann, a senior VP at Lenovo, said: "Many corporations will also stop equipping for Wi-Fi--they will just have campus 5G. If you look at what IoT devices will require when they are constantly connected, they will be connected on 5G.”

As a part of the race for 5G, tech companies are quickly producing 5G compatible devices. With more and more IoT devices working with 5G, the risk of cyber attack on IoT devices increases. Proper malware prevention and endpoint security can help protect companies from the latest cyber threats as 5G continues to expand.

CES never disappoints and always showcases top of the line, next-generation technologies. This year, more than any other year, experts stressed the importance of cybersecurity and the need for businesses and consumers to employ best practices in endpoint security, EDR and Email Security.

Related Insights

Just Because You Don’t see Hackers, Doesn’t Mean They’re Not in Your Network
January 17, 2022

Cybersecurity Platforms are Vigilant Sentries for the Enterprise Fortress

In the taming of every frontier, there has been a deep need for security and protection, from known and unknown threats. From circling the wagons and sentry-armed forts, to our modern security forces and services, we have realized the need to guard what is precious against compromise or calamity.

RevBits Securely Enables USB Devices within Air Gapped Networks
January 12, 2022

RevBits Securely Enables USB Devices within Air Gapped Networks

An air gapped network is physically isolated from other unsecured networks, like the Internet. Due to this isolation, the most common way to pass data is through removable media, like a USB device or external hard drive. If a cyber attacker gains access into an air gapped network they can move laterally across it, and even gain elevated rights and privileges to access otherwise protected resources.

How to Protect Against Rootkit Malware Kernel-Level Attacks
August 09, 2021

How to Protect Against Rootkit Malware Kernel-Level Attacks

For security purposes, it should go without saying, that anything users bring into an enterprise digital environment, like software drivers that have access to the system kernel, must be free from malicious code or software. Everything should be vetted and approved by an IT administrator.

Contact Details

Contact RevBits

Message icon Request a Demo