Home Networking service Palo Alto networks share APAC 2022 cybersecurity forecast – Manila Bulletin

Palo Alto networks share APAC 2022 cybersecurity forecast – Manila Bulletin

0


Global cybersecurity leader Palo Alto Networks has released its forecast of the trends that will shape the digital landscape for 2022.

This year, we have seen a sustained acceleration in innovation and digital transformation as organizations continue to adapt to the effects of the global pandemic. Cyber ​​attackers have become more sophisticated. The impact of ransomware attacks has also reached unprecedented proportions, threatening thousands of organizations around the world and holding critical infrastructure hostage.

With the change in behavior and digital adoption brought about by the pandemic, organizations must remain vigilant in the face of the emerging trends listed below to ensure they have the appropriate solutions to stay ahead of threats.

Prediction 1: The meteoric rise of Bitcoin will create a well-funded opponent

The Asia-Pacific region has seen a significant increase in ransomware attacks. The 2021 Unit 42 Ransomware Threat Report found that the average ransom paid by an organization in the first half of 2021 was $ 570,000, an 82% increase from the previous year. It shows how cybercriminals continue to take advantage of and dominate the cyber threat landscape.

Cryptocurrency is fueling the ransomware economy and due to its growing value and anonymity in ransomware payments, cybercriminals will have more funds and resources to launch larger attacks against critical infrastructure. Beyond monetary losses to businesses, the systems and services upon which entire populations depend could be crippled.

We can also expect cybercriminals to take data mining to the next level with ‘shameware’ attacks – double extortion in ransomware campaigns – to inflict lasting damage to the reputation of unsuccessful targets. do not comply with their ransom demands. We’ll also see quadruple extortion tactics ramp up, as attackers add pressure points to force their victims to pay.

Prediction 2: As the physical and digital lines fade, who or what we trust will have an even greater impact on our security

The era of Web 3.0 will bring more interactions between humans and smart devices through geolocation, computer vision and biometrics or commands. The ubiquity of IoT devices in our daily lives has further blurred the lines between our physical and online worlds. Web 3.0 will make data breaches and other cyber attacks much more impactful, as these attacks target cars, buildings and physical lives and could have far-reaching consequences in the real world.

Now, organizations are making progress in strengthening their cybersecurity defense in the Web 3.0 era.

Prediction 3: API economy will usher in a new era of fraud and digital exploits

While digital banking brings greater convenience and accessibility, it is not without potential risks. The boom in open banking and solid fintech growth in the region, coupled with poor programming done at API level, can have serious repercussions as they form the glue that holds together most applications and applications. digital software. Any misconfiguration of security in APIs could be exploited as a gateway for cybercriminals to access personal data, manipulate a transaction, or shut down a key service.

Financial institutions can build customer confidence and improve anti-fraud measures by including customer education as part of their security strategy.

On the backend, financial institutions must integrate security into all stages of the software delivery process and ensure they have visibility across their entire API ecosystem. This approach, also known as DevSecOps or ‘shift left’ security, ensures that software is tested for security issues before it is released to the public, allowing IT teams to plan for any security issues that may arise. appear after deployment.

Prediction 4: Attackers will lay eyes on countries’ critical digital infrastructure

Critical infrastructure, with its confidential and lucrative data, is a key target for cybercriminals. We have seen several high-profile attacks in the region, including attacks that shut down the New Zealand Stock Exchange and disrupted the operations of Taiwan’s state-owned energy company.

The interconnection of the supply chain and business applications creates additional complications, as cyber attackers can infiltrate critical infrastructure from the edge. In other words, organizations that have taken the necessary precautions to secure themselves may still be exposed to threats from third-party vendors and partners.

Prediction 5: A borderless workforce needs a borderless solution

Threat actors have moved from targeting corporate headquarters or branches to attacking single-family homes. As more and more people move into their home offices, the number of devices provided by the company increases accordingly, it can be video conferencing equipment, IP phones, printers , etc. All of these devices can be points of vulnerability if they are not properly configured and secured.

As remote working becomes a critical long-term strategy for most organizations, they need to extend their corporate networks and bring unified management of security policies to their employees working from home.

This should include the deployment of new integrated solutions such as Secure Access Service Edge (SASE) that combine security, networking and digital experience management. The best of SASE solutions not only provide security but also operational efficiency.

A zero trust mindset will also have to become an important part of this new security paradigm where organizations will have to “trust nothing and validate everything”. Continuously validating every step of a digital interaction across multiple locations will be critical to giving organizations the peace of mind and confidence they need in today’s digital workforce.

With a home environment, businesses and employees alike will expect remote working solutions to be easy to deploy and manage.


SUBSCRIBE TO THE DAILY NEWSLETTER

CLICK HERE TO REGISTER