The last year and a half have been a time of massive digital transformation for many companies around the world. In order to maintain employee productivity when working on the move, a decision sometimes had to be made between productivity and security risks. Joe Carson, security expert at Thycotic Centrify, has looked at the current year and gives five forecasts for cybersecurity for 2022.
Most employees have now got used to their home office and enjoy the opportunity to better balance private and professional tasks. This state of affairs has led many companies to consider moving to a permanent hybrid work environment, which at the same time has resulted in a significant change in security threats.
Ransomware remains a serious threat
Ransomware has become one of the biggest threats as cyber criminals look for more lucrative ways to make a profit. Cyber criminals are becoming more sophisticated as ransom demands skyrocket. In the 2021 State of Ransomware Survey and Report by ThycoticCentrify 64 percent of respondents said they had been the victim of a ransomware attack in the past 12 months. Even more worrying, 83 percent of those affected were forced to pay the ransom to have their data restored. My predictions for 2022
1. We are on the verge of a cyber war
I believe we are on the verge of a full-scale cyber war as governments have decided to stop watching their citizens and businesses fall victim to cyberattacks. This means that they will fight back, which could lead to an outright cyber war. Its effects could get out of control if different groups of hackers get together and act together. As a result, a cyber deal could be envisaged in 2022, forcing cyber criminals to move to less safe havens, while at the same time encouraging countries to unite in the fight against cybercrime. Global stability has been threatened for several years. The rise in cyber attacks and the impact of cyber attacks on society mean that the balance of power is beginning to turn.
2. Identity is the new perimeter, access is the new security
The paradigm shift towards teleworking has accelerated and traditional boundaries no longer exist. However, companies are struggling to define these new frontiers. Factors such as cloud computing, home office networks, end devices, mobile applications and older on-site systems have further complicated the problem. Some organizations have tried to enforce multiple edge perimeter points, but this is difficult to manage and secure.
We have to look at all of these points of contact with the company and determine the connecting or common factor. For most companies, this is identity, one of the artifacts that they can still control. This means that access has become the new security control for company boundaries. In 2022, organizations will regain control by making access security a top priority. Privileged Access has become the digital lie detector test used to verify the authenticity of identities before access to resources is released.
3. Hacking becomes a mainstream sport
For years, gamers and streamers have been a growing trend in social media as audiences want to know their secret techniques that will help them take them to the next level. The popularity continues as the top gamers collect millions in commissions and sponsorship money. Hacking is now following the same trail, with the world's best hackers streaming their hacking skills online, showing new techniques and methods on how to bypass security, get your first foot in the door and then increase privilege. Hacking gamification platforms are also on the rise as hacking teams compete for L33T status to be at the top of the rankings. This new trend will continue in 2022 and we will see hacking become an esports where viewers pay to watch the hackers hack.
4. Zero trust becomes a basic requirement
Zero Trust has been a priority in cybersecurity for a number of years. It is becoming an increasingly important framework to reduce not only the known security risks of the past, but also the security risks of the future. When companies look at what Zero Trust really is, it becomes clear that it is not a single solution to buy or install, or a task to be considered complete at some point. Zero Trust is a journey and a mindset about how to run businesses safely. You don't become Zero Trust, you practice a Zero Trust mentality.
Companies are looking for ways to reduce the risk of cyberattacks. They accept that security must become a living system within the company, rather than the old, static approach. In 2022, Zero Trust can help companies establish a baseline for security controls that need to be repeated, forcing cybercriminals to take more risks. As a result, cyber criminals are noticed earlier and defenders have the chance to detect attackers in good time and prevent catastrophic cyber attacks.
5. Cryptocurrencies should be regulated
Cryptocurrencies have a bad reputation. Bitcoins & Co. are very popular with hackers who use them to pay the ransom for their extortion attacks. Nevertheless, from my point of view, cryptocurrencies will prevail and continue to disrupt the financial industry. But they need to evolve to become a stable method for transactions and accelerate adoption.
Some countries have taken the position that energy consumption has a negative impact and are therefore faced with a decision to either ban or regulate the mining of cryptocurrencies. Meanwhile, several countries have seen cryptocurrencies as a way to differentiate their economies, to become more competitive and attract investment in the tech industry. In 2022, more countries will deal with the question of how they can introduce cryptocurrencies and at the same time ensure more stability. More regulation is only a matter of time. Stabilization will accelerate the adoption of cryptocurrencies, but the big question of how their value is determined remains.
More at Thycotic.com
About ThycoticCentrify ThycoticCentrify is a leading provider of cloud identity security solutions that enable digital transformation on a large scale. ThycoticCentrify's industry-leading Privileged Access Management (PAM) solutions reduce risk, complexity and cost while protecting enterprise data, devices and code in cloud, on-premises and hybrid environments. More than 14.000 leading companies around the world, including more than half of the Fortune 100, trust ThycoticCentrify. Customers include the world's largest financial institutions, intelligence agencies, and critical infrastructure companies. Whether human or machine, in the cloud or on-premises - with ThycoticCentrify, privileged access is secure.