Cloud-based systems in focus in 2021

network 2021 cloud security

Share post

Trend Micro predicts that remote and cloud-based systems will be ruthlessly targeted in 2021. Training, cloud security and XDR are critical to cybersecurity in 2021.

Trend Micro expects home networks, home office software and cloud systems to be at the center of a new wave of cyberattacks in 2021. In its security forecasts for the coming year, the Japanese IT security provider predicts that cyber criminals will primarily view home networks as an entry point for compromising corporate IT and IoT networks.

Security Predictions for 2021

Turning the Tide: Trend Micro Security Predictions for 2021 report warns that end-users who regularly access sensitive data, such as HR managers and executives, are most at risk. Attackers are likely to primarily exploit known vulnerabilities in online collaboration and productivity software soon after they are disclosed. These will play a bigger role in attacks than zero days.

“It is slowly becoming clear what the world will look like after the pandemic. We assume that the trend towards remote working will continue in many companies and expect more aggressive attacks on company data and networks, ”says Richard Werner, Business Consultant at Trend Micro. “IT security officers should therefore invest more in user training, advanced detection and response (XDR) and adaptive access controls. Last year it was all about survival. Now is the time for companies to flourish again, with comprehensive security as the foundation. "

Cybercriminals Access-as-a-Service business models

In addition, cybercriminal Access-as-a-Service business models will grow, with a particular focus on the home networks of high-ranking employees as well as corporate IT and IoT networks. IT security teams should revise their remote work policies and safeguards to address the complexities of hybrid environments, where business and personal information is increasingly coming together on the same device. Zero trust approaches will also play an increasing role here.

As third-party integration continues, Trend Micro is also warning that exposed interfaces (APIs) will be a new preferred vector of attack for cyber criminals. These give them access to sensitive customer data, source codes and back-end services.

Cloud-based systems are another area where threats will persist into 2021 - from unsuspecting users and misconfigurations to attackers trying to take over cloud servers to deploy malicious container images.

Trend Micro recommends the following steps to contain threats in 2021

  • Encourage the education and training of users to extend corporate best practices to the home - including a recommendation against the use of personal devices
  • Maintain tight access controls for both corporate networks and home offices, including zero trust
  • Increased investment in cloud-based security and patch management programs
  • Add security expertise to threat detection to protect cloud workloads, email, endpoints, networks and servers around the clock

Cyber ​​criminals continue to move where the money can be found in order to get the maximum financial return from their attacks. Companies and IT security officers have to be quick and vigilant in order to always be one step ahead of criminals.

More about analysis at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more