Connect with us

Hi, what are you looking for?

HEADLINES

5 Predictions for cybersecurity in 2022

As organizations worldwide slow down for the holidays as well as find themselves in work environment transitions – with many returning to pre-pandemic in-office models and others extending their hybrid workforce – distractions will create opportunity for cybercriminals to infiltrate networks without raising suspicions.

At the start of 2022, many businesses will be breached

As organizations worldwide slow down for the holidays as well as find themselves in work environment transitions – with many returning to pre-pandemic in-office models and others extending their hybrid workforce – distractions will create opportunity for cybercriminals to infiltrate networks without raising suspicions. Well into 2022 we will see breach disclosures and cyberattacks with initial compromise tracking back to early in the year.

One business’s ransomware attack, will become another business’s extortion 

Ransomware attacks will become more relentless in their quest to scale up revenue and do so fast. In 2022 we will start seeing more and more triple extortion ransomware, whereby a ransomware attack experienced by one business, becomes an extortion threat for its business partner. Ransomware attackers won’t stop at extorting the victim organization for ransom, they will extort its business partners whose data it holds or business partners who cannot afford the supply chain disruption. 

Advertisement. Scroll to continue reading.

Supply chain attacks will become a top boardroom concern

In 2021 the world felt the brunt of supply chain bottlenecks due to COVID-19 restrictions, and recognizing this, cybercriminals will seek to capitalize on our heavy reliance on supply chains — both on a consumer and enterprise level. Supply chains have many blind spots or cracks that attackers can take advantage. Ransomware attacks will be a threat not only to companies as individual entities but to their supply chains as a whole, making these types of  attacks a top concern for the Board.

Blockchain will become a cybercrime hideout

With enterprises and consumers increasingly relying on blockchain for their supply chain management and digital transactions, we’ll begin to see attackers too turn to its legitimate use to stay under the radar for longer. In 2022, we’ll see blockchain become a more common “tool” used by cybercriminals to obfuscate their malicious traffic, avoid detection and extend attacker’s stealth. This will make it increasingly harder for defenders to discern malicious activity on the network. 

Zero Tolerance for Trust Will Redefine the State of Security

Advertisement. Scroll to continue reading.

More and more businesses are realizing that to build customer trust they must establish zero tolerance for trust in their security strategy. In 2022 we will start to see government and private industry scrutinize their trusted relationships more, and re-evaluate the “who, what, why” regarding access to their data. Not only will will start seeing more “auditing’ of user access, but application access to data as well.

Predictions for cybersecurity in 2022 by Charles Henderson, Head of IBM X-Force, Nick Rossmann, Global Threat Intelligence Lead, IBM X-Force, and Laurance Dine, Global Partner, IBM X-Force Incident Response. 

Advertisement
Advertisement
Advertisement

Like Us On Facebook

You May Also Like

HEADLINES

The exploit, discovered by Kaspersky’s Global Research and Analysis Team (GReAT), required no user interaction beyond clicking a malicious link and demonstrated exceptional technical...

HEADLINES

At the end of 2023, Sophos X-Ops noted a significant increase in ‘remote encryption’ attacks – where ransomware attackers breach a compromised and often...

HEADLINES

With the launch of KATA 7.0, organizations can now benefit from enhanced Network Detection and Response (NDR) capabilities with deeper network visibility, internal threats...

HEADLINES

In 2024, Globe blocked 3,096 child pornography domains or those containing child sexual abuse and exploitation materials (CSAEM), a slight increase from 3,047 domains restricted...

HEADLINES

During a recent webinar on Building Resilience Against Online Scams, hosted by fiber broadband and technology provider Converge ICT Solutions Inc., its Chief Executive...

HEADLINES

In 2024, Kaspersky restructured its Partner Program into four key partner types, recognizing the diverse profiles within its network – from traditional resellers and...

White Papers

The study tested 2,000 UK and US consumers, exposing them to a series of real and deepfake content. The results are alarming: only 0.1%...

HEADLINES

Deepfakes pose significant threats and risks, with nearly half of companies worldwide reporting incidents in 2024, according to industry reports. HONOR’s innovative solution immediately...

Advertisement