Cyber Security Threats In 2022

The major cyber security threats and trends expected in 2022 will be influenced to a large extent by the  continuing impact of Covid-19, as cyber criminals continue to take advantage of the poor level of awareness of cyber security by many organiations' employees. 

This is influenced  by remote working and an  increasing reliance on e-commerce, mass mobile gaming and video meetings.

Across the board, authoritative cyber security researchers say that the threat of ransomware isn’t going away and they predict that the frequency, intensity and sophistication of ransomware attacks will significantly increase in 2022.  

Since ransomware is counted amongst the most lucrative attack vectors for cyber criminals, this is hardly a  surprising  prediction. Companies that hold sensitive data or personally identifiable information are common targets for hackers. Businesses or organisations that are most vulnerable to cyber attacks include banks and financial institutions, healthcare organisations and any organistaion which holds sensitive data such as product concepts, intellectual property. 

In 2022, we can expect criminals to use highly sophisticated malware hidden inside legitimate software updates, permiting attackers not only to exfiltrated targeted data but also spread the malware across a huge range of victims. Indeed, cyber crime costs in 2025 are expected to reach $10.5 trillion, up from $6 trillion in 2021.  

Furthermore, cyber security in 2022 will be characterised by several major trends:

A continuing incline in malware cyber security threats -  with ransomware being a particularly expected form of them. The frequency of ransomware attacks has increased from one every 40 seconds in 2016 to one every 11 seconds in 2021.

 Increase in attacks via the Internet of Things (IoT) – connected electronic devices. While attacks via the IoT are already evident, 2022 will most probably see a rise in not only individual threats but also the further sophistication of their delivery methods.

 Cyber criminals will move from identity theft to identity fraud - Criminal are accumulating personal identifying information, but they’re not using it to target consumers as much as they used to do. Rather, they’re using it in credential attacks on businesses. The increase in fraud will lead to another development in 2022, a behavior change as consumers withdrawing from certain kinds of online activity.

 A rise in preventive measures, to better counter cyber attacks -2022 is the year that we’ll be seeing a rise in AI-based cybersecurity, with the technology becoming more and more sophisticated as machine learning develops to prevent all sorts of conducted attacks. 

But it’s not all bad news. Those organisations which acknowledge the threat and subsequently implement the necessary training, technology and services are much more likely to stay safe.

Organisations need to be aware of the vulnerabilities and security risks this will expose their employers to and in the EU many more organisations have increased their zero trust budgets in 2021. Zero trust adoption will extend across even more private organizations and governments to counter the growing threat landscape.

Zero trust applies the principle of fundamentally not trusting anything on or off your network and deploys a “assume-breach” mindset. 

Innovative cyber security vendor Darktrace has identified a growing trend of hackers targeting  for backup servers in an attempt to deliberately disable or corrupt backup files by deleting a single index file that would render all backups inaccessible. Attackers could then launch ransomware attacks against the clients of the backup vendor, preventing recovery and forcing payment. In 2020, the most attacked industry across Darktrace’s global customer base was the financial and insurance sector, showing that cyber-criminals have shifted their focus over the last 12 months.

With more organisations unified in their approach to addressing cyber risks, the adoption of zero trust can provide greater visibility to improve an organisation’s overall security posture.

Currently, 31% of UK organisations are planning to invest more than $1m into security strategies in 2022. With businesses prioritising the likes of Cloud Security (59%), Endpoint security (50%), Advanced threat protection (38%) and the Security Operations Centre (37%).

The key thing for businesses cyber security is to make  the transition from reactive to proactive behaviour. 

Darktrace:     Digital Inormation World:      IDG Connect:     Verdict:     Business Chief:     IT World Canada

I-HLS:   HelpNetSecurity:

For advice and recommendations on  performing an independent cyber security audit for your company, please contact Cyber Security Intelligence > Here <

You Might Also Read: 

Worldwide Cyber Security Threats:

 

« Avoid Being A Victim Of Cyber Crime – Get Audited
What To Expect From Data Science In 2022 »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyberis

Cyberis

Cyberis are pioneers in customer-focussed information security. Since 2011, we’ve been helping businesses protect their brands, customers and reputation.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

SC Media

SC Media

SC Media arms information security professionals with the in-depth, unbiased business and technical information they need to tackle the countless security challenges they face.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

NLnet Labs

NLnet Labs

NLnet Labs is a not-for-profit foundation with a long heritage in research and development, Internet architecture and governance, as well as security in the area of DNS and inter-domain routing.

Yelbridges

Yelbridges

Yelbridges is your reliable partner in all fields of IT-Security, from developing of Security Policies and Guidelines to the design and implementation of secure processes.

Emagined Security

Emagined Security

Emagined Security is a leading provider of professional services for Information Security and Compliance solutions.

Edureka

Edureka

Edureka is an online technology training provider with the most effective learning system in the world. We help professionals learn trending technologies for career growth.

AgileBlue (Agile1)

AgileBlue (Agile1)

AgileBlue (formerly Agile1) is a managed breach detection company with an Autonomous SOC-as-a-Service for 24×7 monitoring, detection and guided response.

Fusion Risk Management

Fusion Risk Management

Fusion Risk Management focuses on operational resilience encompassing business continuity, risk management, IT risk, and crisis and incident management.

Birch Cline Cybersecurity

Birch Cline Cybersecurity

Birch Cline specializes in helping Local Government and Education agencies, as well as mid-market organizations, build and maintain successful cybersecurity programs.

Morpheus Enterprises

Morpheus Enterprises

Morpheus Enterprises offer managed security solutions designed to keep your web applications secure and your business running smoothly.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

Infisign

Infisign

Infisign addresses the challenges of traditional IAM systems and offers a comprehensive solution for modern identity management.

Lupasafe

Lupasafe

Lupasafe is a software for businesses to see IT risks and insights, and provide vital training for employees.