A glimpse into the future: cybersecurity in 2022

2021 has been a turbulent year. A year in which we learned to live adjusting to a new pandemic reality. Right now, as the year is coming to an end, is the perfect time to talk about cybersecurity predictions for 2022. Here’s a look at the future:

We have to face the fact that the “work from home” culture and habits will remain with us even after the pandemic is over. Many people have made the switch to remote work and don’t want to turn back. For the ordinary user, this means being more aware of their privacy and cybersecurity which, under this work scheme, is also the privacy and security of their employer. Over the past two years, most people who work from home have gotten used to previously unfamiliar IT jargon: two-step authentication, virtual desktop infrastructure, one-time password, VPN connections, etc. Ironically, one of the positive consequences of the pandemic has been to pay more attention to safety!

For the foreseeable future, people are likely to continue working from home. This means more opportunities for attackers to compromise corporate networks, including using social engineering to obtain credentials and large-scale attacks against corporate services in the hope of running into poorly protected servers. Additionally, as many people continue to use their own devices for work purposes, rather than those provided by corporate IT teams, attackers will seek new opportunities to compromise unprotected home computers.

Since the beginning of the pandemic, a growing number of medical services have migrated to the digital world, either in part or in full, so patients are now awaiting notifications about the results of health tests and messages from their doctors. . Thus, an email, pretending to be an important “medical” notification, can be just as successful in misleading its victims as bogus messages posing as banks or government services.

The increase in the number of data leaks and ransomware attacks on medical organizations makes it clear, among other things, that there is a lack of awareness about information security on the part of healthcare employees. If a large-scale training process is not carried out in 2022, we will witness a continuous increase in these types of attacks.

The amount of medical data in information leaks will also increase. The data contained in medical records is, by itself, very sensitive. However, the possibilities for digitizing medical equipment are increasing, and providers are increasingly using wearable devices or even sensors implanted in the human body to collect even more sensitive data that is not necessarily medical in nature.

Telemedicine will continue to evolve as well. This means that more applications for medical consultation and patient health monitoring will appear, and cybercriminals will have the opportunity to discover security holes in a large number of new applications created by programmers who have never made these types of products before. What’s more, malicious fake telehealth apps are most likely to appear in app stores – fake apps that mimic the real thing and promise to offer the same functionality.

In the last decade, the entire industry observed a trend where cyberspace is becoming increasingly politicized and balkanized, especially when it comes to cyber warfare. Last year, we predicted that prosecution would become an integral part of Western states’ arsenals to impose costs on the adversary’s operations. However, one problem is that states that report cyberattacks against them are also known to carry them out.

Privacy regulations will continue to be a hot topic around the world for many years to come. Information gathering is a powerful tool, both for large technology companies and for state public services. But it can also lead to the potential for large data breaches, discrimination, and human rights crimes. With the burgeoning international trend of protectionism, this in turn will lead to stricter local regulations, such as privacy laws, data localization laws, the call for greater algorithmic transparency, and greater regulation on what data and when it is accessible to. the forces of order.

*Eugene Kaspersky / Red Forbes
Cybersecurity expert


Leave a Reply

Your email address will not be published. Required fields are marked *