Digital transformation has been rapidly driven by Covid-19 and the subsequent need to move professionals that previously worked in offices to work remotely within their homes. This has led to the creation of millions of connected offices around the world.
Due to this, it is no surprise that data breaches have grown in volume and complexity in 2020, with the number of breaches increasing 273% in the first quarter compared to 2019.
Worldwide, data hijacking set a record in the first half of 2021: 304.7 million ransomware attempts were detected in the 6-month period, while the total figure for the year 2020 fell short at 304.6 million, according to data from the Cyber Threat Report produced by cybersecurity firm SonicWall, released in July 2021. In this report, Brazil ranked fifth in the list of countries with the highest number of attacks.
What is even more surprising is that a single hacker was able to steal 34 million user records from seventeen different companies in 2020.
Remote working has created new opportunities for hackers to exploit vulnerable employee devices and networks. For this reason, McKinsey & Company has estimated that digital transformation has advanced by up to seven years in the past few months.
Follow this article to the end to learn about the top cybersecurity trends for 2022!
Cybersecurity Trends for 2022
The volume of stored data will be even greater in the coming years
The world will store 200 zetabytes of data by 2025, according to Cybersecurity Ventures. This unimaginable total includes data stored in private and public IT infrastructures, in public services infrastructures, in cloud data centers, and on personal devices.
Infographic produced by Cybersecurity Ventures to represent the increase in data volume.
The influences leading to this event include digital transformation and the business model of companies, with more people doing business using the internet as the main data transaction channel. Our way of life is becoming more and more online, and the tendency is for this to continue.
Hence it is clear that protecting this data from attacks is not an easy task, especially when there are so many different types and standards of security on the devices. It is necessary to look for more advanced solutions.
Increasing Online Transactions Become Targets for Cyber Threats
During the pandemic, consumers shifted dramatically to online channels. In turn, companies and business sectors responded by prioritizing digital.
This was proven with respondents to the Cybersecurity Ventures survey: they are three times more likely now than before the pandemic to say that at least 80 percent of their customer interactions are digital in nature.
Likewise, increasing the volume of transactions increases the criminal eyes on this data, which becomes more targeted. Regarding payment data, when used on platforms without optimal security standards, they can be easily accessed.
The trend of cybercriminals is to adopt ransomware
According to a Deep Instinct research, ransomware usage increased by 435% in 2020 compared to 2019. The reason is that ransomware has become the preferred weapon of hackers in the Covid-19-induced digital landscape. The transformation of so many companies operating in a predominantly digital mode has created more targets for extortion.
The bottom line is that the average ransomware payout has grown to about $234,000 per event, according to cybersecurity firm Coveware.
The biggest change in the last two years is that threat actors now realize that their tactics suit much larger companies without much increase in their own efforts.
Experts confirm that investing in cybersecurity is a business decision
We have selected phrases from experts that prove it: cybersecurity is connected with business decisions as a whole.
Source: Cybersecurity Is a Business Decision, Published November 2, 2020, Authors: Paul Proctor and Srinath Sampath
- “Cybersecurity is a business decision. CIOs must take a strategic view toward cybersecurity as a business decision that balances protection needs with desired outcomes. The technological, environmental and business drivers for cyber security influence how a cyber security program is built in a business context. Trust and resilience are built into security and business results.”;
- “Evolve the way you measure and report security to reflect the protection levels of your key business outcomes. Make sure your cybersecurity controls are consistent, adequate, reasonable, and effective. Treat security as a business decision”.
Source: Top Strategic Technology Trends for 2021: Cybersecurity Mesh, published February 4, 2021, authored by Jay Heiser and Felix Gaehtgens
- “Cloud computing offers the scalability and accessibility needed to host security services that can reliably and conveniently support a global cybersecurity network. Offering technology as a service means that the vendor is responsible for routine maintenance and upgrades. The corporate cybersecurity team can focus on maintaining policy, while letting the vendor worry about the plumbing. Gartner research indicates that 80% of organizations expect to use security as a service by 2023.”
Why are companies moving to the cloud and how is this related to cybersecurity?
Since your data is stored in the cloud, you can access it no matter what happens to your machine. You can even remotely delete data from lost devices so that it doesn’t fall into the wrong hands.
In this case, it contributes with two important aspects:
Security Process Automation
The lack of experienced security staff should lead organizations to rely more and more on automation of the security process. Automation tools ensure continuous, automated safety operations based on pre-established rules and procedures.
Thus, security tasks can be performed quickly, efficiently, and with less chance for errors.
Data Privacy as a Focus
With growing concerns regarding data management and security, privacy must be a part of compliance requirements. In the cloud, this is already defined as a discipline of its own and increasingly significant for maintaining cybersecurity alignment.
Remember that data privacy affects almost every aspect of an organization, from the direction of corporate strategy to direct alignment with security, HR, governance, and procurement. But with the cloud, it is much easier to meet the requirements of LGPD (General Data Protection Law).
Now that you know all about cybersecurity and how the cloud works to ensure the highest level of security, migrate your system to the cloud in a few hours and reduce up to 70% of your IT expenses with Sky.One’s solutions!