Cyber Security Threats In 2022

The major cyber security threats and trends expected in 2022 will be influenced to a large extent by the  continuing impact of Covid-19, as cyber criminals continue to take advantage of the poor level of awareness of cyber security by many organiations' employees. 

This is influenced  by remote working and an  increasing reliance on e-commerce, mass mobile gaming and video meetings.

Across the board, authoritative cyber security researchers say that the threat of ransomware isn’t going away and they predict that the frequency, intensity and sophistication of ransomware attacks will significantly increase in 2022.  

Since ransomware is counted amongst the most lucrative attack vectors for cyber criminals, this is hardly a  surprising  prediction. Companies that hold sensitive data or personally identifiable information are common targets for hackers. Businesses or organisations that are most vulnerable to cyber attacks include banks and financial institutions, healthcare organisations and any organistaion which holds sensitive data such as product concepts, intellectual property. 

In 2022, we can expect criminals to use highly sophisticated malware hidden inside legitimate software updates, permiting attackers not only to exfiltrated targeted data but also spread the malware across a huge range of victims. Indeed, cyber crime costs in 2025 are expected to reach $10.5 trillion, up from $6 trillion in 2021.  

Furthermore, cyber security in 2022 will be characterised by several major trends:

A continuing incline in malware cyber security threats -  with ransomware being a particularly expected form of them. The frequency of ransomware attacks has increased from one every 40 seconds in 2016 to one every 11 seconds in 2021.

 Increase in attacks via the Internet of Things (IoT) – connected electronic devices. While attacks via the IoT are already evident, 2022 will most probably see a rise in not only individual threats but also the further sophistication of their delivery methods.

 Cyber criminals will move from identity theft to identity fraud - Criminal are accumulating personal identifying information, but they’re not using it to target consumers as much as they used to do. Rather, they’re using it in credential attacks on businesses. The increase in fraud will lead to another development in 2022, a behavior change as consumers withdrawing from certain kinds of online activity.

 A rise in preventive measures, to better counter cyber attacks -2022 is the year that we’ll be seeing a rise in AI-based cybersecurity, with the technology becoming more and more sophisticated as machine learning develops to prevent all sorts of conducted attacks. 

But it’s not all bad news. Those organisations which acknowledge the threat and subsequently implement the necessary training, technology and services are much more likely to stay safe.

Organisations need to be aware of the vulnerabilities and security risks this will expose their employers to and in the EU many more organisations have increased their zero trust budgets in 2021. Zero trust adoption will extend across even more private organizations and governments to counter the growing threat landscape.

Zero trust applies the principle of fundamentally not trusting anything on or off your network and deploys a “assume-breach” mindset. 

Innovative cyber security vendor Darktrace has identified a growing trend of hackers targeting  for backup servers in an attempt to deliberately disable or corrupt backup files by deleting a single index file that would render all backups inaccessible. Attackers could then launch ransomware attacks against the clients of the backup vendor, preventing recovery and forcing payment. In 2020, the most attacked industry across Darktrace’s global customer base was the financial and insurance sector, showing that cyber-criminals have shifted their focus over the last 12 months.

With more organisations unified in their approach to addressing cyber risks, the adoption of zero trust can provide greater visibility to improve an organisation’s overall security posture.

Currently, 31% of UK organisations are planning to invest more than $1m into security strategies in 2022. With businesses prioritising the likes of Cloud Security (59%), Endpoint security (50%), Advanced threat protection (38%) and the Security Operations Centre (37%).

The key thing for businesses cyber security is to make  the transition from reactive to proactive behaviour. 

Darktrace:     Digital Inormation World:      IDG Connect:     Verdict:     Business Chief:     IT World Canada

I-HLS:   HelpNetSecurity:

For advice and recommendations on  performing an independent cyber security audit for your company, please contact Cyber Security Intelligence > Here <

You Might Also Read: 

Worldwide Cyber Security Threats:

 

« Avoid Being A Victim Of Cyber Crime – Get Audited
What To Expect From Data Science In 2022 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Perimeter 81 / Black Hat On-Demand Webinar

Perimeter 81 / Black Hat On-Demand Webinar

Black Hat On-Demand Webinar - Identity is the New Perimeter: This webinar will provide you with vital insights to help understand the need for Zero Trust and how it can transform your network.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Surrey Centre for Cyber Security (SCCS)

Surrey Centre for Cyber Security (SCCS)

The Centre focuses on three main research directions - Privacy and Data Protection, Secure Communications, and Human-Centred Security.

SailPoint

SailPoint

SailPoint provides identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

ANIS

ANIS

ANIS represents the interests of Romanian IT companies and supports the development of the software and services industry.

CERT-PH

CERT-PH

CERT-PH is the National Computer Emergency Response Team and the highest body for cybersecurity related activities in the Philippines.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.