Cyber Security Threats In 2022

The major cyber security threats and trends expected in 2022 will be influenced to a large extent by the  continuing impact of Covid-19, as cyber criminals continue to take advantage of the poor level of awareness of cyber security by many organiations' employees. 

This is influenced  by remote working and an  increasing reliance on e-commerce, mass mobile gaming and video meetings.

Across the board, authoritative cyber security researchers say that the threat of ransomware isn’t going away and they predict that the frequency, intensity and sophistication of ransomware attacks will significantly increase in 2022.  

Since ransomware is counted amongst the most lucrative attack vectors for cyber criminals, this is hardly a  surprising  prediction. Companies that hold sensitive data or personally identifiable information are common targets for hackers. Businesses or organisations that are most vulnerable to cyber attacks include banks and financial institutions, healthcare organisations and any organistaion which holds sensitive data such as product concepts, intellectual property. 

In 2022, we can expect criminals to use highly sophisticated malware hidden inside legitimate software updates, permiting attackers not only to exfiltrated targeted data but also spread the malware across a huge range of victims. Indeed, cyber crime costs in 2025 are expected to reach $10.5 trillion, up from $6 trillion in 2021.  

Furthermore, cyber security in 2022 will be characterised by several major trends:

A continuing incline in malware cyber security threats -  with ransomware being a particularly expected form of them. The frequency of ransomware attacks has increased from one every 40 seconds in 2016 to one every 11 seconds in 2021.

 Increase in attacks via the Internet of Things (IoT) – connected electronic devices. While attacks via the IoT are already evident, 2022 will most probably see a rise in not only individual threats but also the further sophistication of their delivery methods.

 Cyber criminals will move from identity theft to identity fraud - Criminal are accumulating personal identifying information, but they’re not using it to target consumers as much as they used to do. Rather, they’re using it in credential attacks on businesses. The increase in fraud will lead to another development in 2022, a behavior change as consumers withdrawing from certain kinds of online activity.

 A rise in preventive measures, to better counter cyber attacks -2022 is the year that we’ll be seeing a rise in AI-based cybersecurity, with the technology becoming more and more sophisticated as machine learning develops to prevent all sorts of conducted attacks. 

But it’s not all bad news. Those organisations which acknowledge the threat and subsequently implement the necessary training, technology and services are much more likely to stay safe.

Organisations need to be aware of the vulnerabilities and security risks this will expose their employers to and in the EU many more organisations have increased their zero trust budgets in 2021. Zero trust adoption will extend across even more private organizations and governments to counter the growing threat landscape.

Zero trust applies the principle of fundamentally not trusting anything on or off your network and deploys a “assume-breach” mindset. 

Innovative cyber security vendor Darktrace has identified a growing trend of hackers targeting  for backup servers in an attempt to deliberately disable or corrupt backup files by deleting a single index file that would render all backups inaccessible. Attackers could then launch ransomware attacks against the clients of the backup vendor, preventing recovery and forcing payment. In 2020, the most attacked industry across Darktrace’s global customer base was the financial and insurance sector, showing that cyber-criminals have shifted their focus over the last 12 months.

With more organisations unified in their approach to addressing cyber risks, the adoption of zero trust can provide greater visibility to improve an organisation’s overall security posture.

Currently, 31% of UK organisations are planning to invest more than $1m into security strategies in 2022. With businesses prioritising the likes of Cloud Security (59%), Endpoint security (50%), Advanced threat protection (38%) and the Security Operations Centre (37%).

The key thing for businesses cyber security is to make  the transition from reactive to proactive behaviour. 

Darktrace:     Digital Inormation World:      IDG Connect:     Verdict:     Business Chief:     IT World Canada

I-HLS:   HelpNetSecurity:

For advice and recommendations on  performing an independent cyber security audit for your company, please contact Cyber Security Intelligence > Here <

You Might Also Read: 

Worldwide Cyber Security Threats:

 

« Avoid Being A Victim Of Cyber Crime – Get Audited
What To Expect From Data Science In 2022 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

ZDL Group

ZDL Group

At ZDL (formerly ZeroDayLab) we take a comprehensive view of our clients cyber security risks and provide quality services to address those risk

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

Information & eGovernment Authority (iGA) - Bahrain

Information & eGovernment Authority (iGA) - Bahrain

The Information & eGovernment Authority facilitates many services catering to different parts of the community within the IT sector in Bahrain including information security.

SHIELD

SHIELD

SHIELD is an established end-to-end fraud management solution that blocks fraudulent activities such as account takeovers, fake accounts creation, fraudulent payments, loyalty fraud and more.

Encore Media Group

Encore Media Group

Encore Media Group provide an international enterprise technology event series exploring IoT, Blockchain AI, Big Data, 5G, Cyber Security and Cloud.

AppOmni

AppOmni

AppOmni is the only SaaS CSPM solution that gives teams all the tools they need to be successful – from security posture management to monitoring and detection to continuous compliance.

RiskXchange

RiskXchange

RiskXchange's cybersecurity risk rating solution helps businesses solve complex cybersecurity and compliance challenges by providing a 360-degree view of your cybersecurity posture.

InterGuard

InterGuard

As the pioneer for Unified Insider Threat Prevention and productivity monitoring tools, InterGuard offers on premise and SaaS-based services that are easily available and affordable.

Neovera

Neovera

Neovera is a trusted provider of managed services including cyber security and enterprise cloud solutions, committed to delivering results through the innovative use of scalable enterprise-grade tech.

Bigbee Technology

Bigbee Technology

Bigbee Technology are an IT solutions company based in Dar es Salaam founded by a group of professionals from around the globe.

Chartered Institute of Information Security (CIISec)

Chartered Institute of Information Security (CIISec)

CIISec is dedicated to helping individuals and organisations develop capability and competency in cyber security.

Teleport

Teleport

Teleport is a remote-first technology company. We enable engineers to quickly access any computing resource anywhere on the planet.

Ministry of Electronics & Information Technology (MeitY)

Ministry of Electronics & Information Technology (MeitY)

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

CySecK

CySecK

CySecK is a Centre of Excellence in Cybersecurity formed in 2017 by the Government of Karnataka, as part of the Technology Innovation Strategy.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.