Five cybersecurity predictions for 2022

Five cybersecurity predictions for 2022

Share post

The last year and a half have been a time of massive digital transformation for many companies around the world. In order to maintain employee productivity when working on the move, a decision sometimes had to be made between productivity and security risks. Joe Carson, security expert at Thycotic Centrify, has looked at the current year and gives five forecasts for cybersecurity for 2022.

Most employees have now got used to their home office and enjoy the opportunity to better balance private and professional tasks. This state of affairs has led many companies to consider moving to a permanent hybrid work environment, which at the same time has resulted in a significant change in security threats.

Ransomware remains a serious threat

Joe Carson, Security Specialist at Thycotic Centrify

Ransomware has become one of the biggest threats as cyber criminals look for more lucrative ways to make a profit. Cyber ​​criminals are becoming more sophisticated as ransom demands skyrocket. In the 2021 State of Ransomware Survey and Report by ThycoticCentrify 64 percent of respondents said they had been the victim of a ransomware attack in the past 12 months. Even more worrying, 83 percent of those affected were forced to pay the ransom to have their data restored. My predictions for 2022

1. We are on the verge of a cyber war

I believe we are on the verge of a full-scale cyber war as governments have decided to stop watching their citizens and businesses fall victim to cyberattacks. This means that they will fight back, which could lead to an outright cyber war. Its effects could get out of control if different groups of hackers get together and act together. As a result, a cyber deal could be envisaged in 2022, forcing cyber criminals to move to less safe havens, while at the same time encouraging countries to unite in the fight against cybercrime. Global stability has been threatened for several years. The rise in cyber attacks and the impact of cyber attacks on society mean that the balance of power is beginning to turn.

2. Identity is the new perimeter, access is the new security

The paradigm shift towards teleworking has accelerated and traditional boundaries no longer exist. However, companies are struggling to define these new frontiers. Factors such as cloud computing, home office networks, end devices, mobile applications and older on-site systems have further complicated the problem. Some organizations have tried to enforce multiple edge perimeter points, but this is difficult to manage and secure.

We have to look at all of these points of contact with the company and determine the connecting or common factor. For most companies, this is identity, one of the artifacts that they can still control. This means that access has become the new security control for company boundaries. In 2022, organizations will regain control by making access security a top priority. Privileged Access has become the digital lie detector test used to verify the authenticity of identities before access to resources is released.

3. Hacking becomes a mainstream sport

For years, gamers and streamers have been a growing trend in social media as audiences want to know their secret techniques that will help them take them to the next level. The popularity continues as the top gamers collect millions in commissions and sponsorship money. Hacking is now following the same trail, with the world's best hackers streaming their hacking skills online, showing new techniques and methods on how to bypass security, get your first foot in the door and then increase privilege. Hacking gamification platforms are also on the rise as hacking teams compete for L33T status to be at the top of the rankings. This new trend will continue in 2022 and we will see hacking become an esports where viewers pay to watch the hackers hack.

4. Zero trust becomes a basic requirement

Zero Trust has been a priority in cybersecurity for a number of years. It is becoming an increasingly important framework to reduce not only the known security risks of the past, but also the security risks of the future. When companies look at what Zero Trust really is, it becomes clear that it is not a single solution to buy or install, or a task to be considered complete at some point. Zero Trust is a journey and a mindset about how to run businesses safely. You don't become Zero Trust, you practice a Zero Trust mentality.

Companies are looking for ways to reduce the risk of cyberattacks. They accept that security must become a living system within the company, rather than the old, static approach. In 2022, Zero Trust can help companies establish a baseline for security controls that need to be repeated, forcing cybercriminals to take more risks. As a result, cyber criminals are noticed earlier and defenders have the chance to detect attackers in good time and prevent catastrophic cyber attacks.

5. Cryptocurrencies should be regulated

Cryptocurrencies have a bad reputation. Bitcoins & Co. are very popular with hackers who use them to pay the ransom for their extortion attacks. Nevertheless, from my point of view, cryptocurrencies will prevail and continue to disrupt the financial industry. But they need to evolve to become a stable method for transactions and accelerate adoption.

Some countries have taken the position that energy consumption has a negative impact and are therefore faced with a decision to either ban or regulate the mining of cryptocurrencies. Meanwhile, several countries have seen cryptocurrencies as a way to differentiate their economies, to become more competitive and attract investment in the tech industry. In 2022, more countries will deal with the question of how they can introduce cryptocurrencies and at the same time ensure more stability. More regulation is only a matter of time. Stabilization will accelerate the adoption of cryptocurrencies, but the big question of how their value is determined remains.

More at Thycotic.com

 


About ThycoticCentrify

ThycoticCentrify is a leading provider of cloud identity security solutions that enable digital transformation on a large scale. ThycoticCentrify's industry-leading Privileged Access Management (PAM) solutions reduce risk, complexity and cost while protecting enterprise data, devices and code in cloud, on-premises and hybrid environments. More than 14.000 leading companies around the world, including more than half of the Fortune 100, trust ThycoticCentrify. Customers include the world's largest financial institutions, intelligence agencies, and critical infrastructure companies. Whether human or machine, in the cloud or on-premises - with ThycoticCentrify, privileged access is secure.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

[starboxid=USER_ID]