There is no doubt that 2021 gave Cybersecurity professionals a run for their money, no matter what their line of expertise is.  A lot of this was fueled by the sheer onslaught of Ransomware attacks, which was totally unprecedented.  This trend is expected to continue going into 2022, but what are the other Cyber predictions?  Let’s take a closer look.

What’s In Store For 2022

  1. Supply Chain Attacks will become more prevalent:
    This kind of attack was best exemplified by the Solar Winds security breach.  Through just one software application, thousands of other people were hit, ranging all the way from the US Federal Government to some of the smallest healthcare organizations.  This trend is expected to continue into 2022, but with many more of them happening.  Many Cyber experts believe that it may not the large-scale event like with Solar Winds, but rather, they will be a lot smaller, with many more of them happening, in quick succession, happening almost one after the other.  This is one tactic the Cyberattacker can use in order to evade immediate detection.
  2. There will be a new kind of warfare:
    Many of us witnessed the Cold War back in the 1980s.  But rather than threatening the launch of nuclear missiles, nation state actors will now take this battlefield to the Cyber arena.  Some of these nations include China, Russia, and North Korea.  The biggest fear in this regard is that there could be a massive attack on the US Critical Infrastructure, which could halt the water supply, gas and oil pipelines, the nation’s food supply, and even shut down the nation’s electrical grid for a long period of time.  But we are not talking about just a few days without these necessities.  We are talking weeks, which has many top-level government officials very worried.
  3. Data Leakages:
    As many businesses across Corporate America migrate to a Cloud based Infrastructure such as that of Microsoft Azure, there is now a greater fear that data leakages will be common place, whether it is intentional or not.  In the end, the Cloud provider cannot be blamed for this.  Rather, it will shift to the tenant, who may not have configured their Virtual Machines (VMs) properly and securely, according to their own requirements.
  4. Fake news will abound:
    With the COVID19 pandemic still with us, and new variants coming out, the spreading of false information across all of the digital lines of communication will only get worse.  For example, there will be a further explosion with domain name heisting, the creation of phony and fictitious websites, etc.  The goal here is to collect the login credentials of the unsuspecting victim in order to launch subsequent Identity Theft attacks against them.  One example of this is the Cyberattacker selling out fake COVID19 vaccination certificates to individuals who not get vaccinated.
  5. Deepfakes will get worse:
    This is where AI and ML tools are used by the Cyberattacker in order to create fake videos and audio messages of real people.  A perfect example of this is at election time.  Fake videos of real politicians can be created asking for donations to their respective campaigns.  But instead of giving it to a real cause, the unsuspecting victim is directed to a phony (but very realistic) looking website in which any money donated from that point is wired to an offshore account, that can never be traced.  It is expected that the use of Deepfakes will be used for much broader types of Cyber-attacks, such as that of Social Engineering.
  6. Further attacks in the Virtual Currencies:
    For the most part, we have all heard of Bitcoin, and the potential that it can bring large amounts of wealth as well as huge losses especially given its volatility.  The Cyberattacker is primed to take full advantage of this in 2022, as the Virtual Currency market continues to heat up.  The main attack vehicle in this regard is that of Crypto-jacking, where the Cyberattacker illegally mines for these Virtual Currencies by covertly tapping into the electrical and processing powers of the victim’s device.
  7. Mobile attacks will grow:
    Many employees are now using their Smartphones to conduct their daily work tasks.  Because of this, they will become yet another prime target for the Cyberattacker in 2022.  It is expected that Phishing, Malware, and Ransomware attacks will become much more sophisticated on popular smartphones.

Conclusions

One of the best ways to protect yourself from these threats in 2022 is to migrate your entire IT and Network Infrastructure into Microsoft Azure.  There are plenty of tools that come with your plan to fortify lines of defenses.  If you have any questions about this, please contact us.