This includes addressing the vulnerabilities of the hybrid workforce, and the need for businesses to adopt a zero trust model to gain visibility into the scale of the attack surface.
1. Ransomware operators to adopt cost-benefit analysis
Rather than targeting and scaling attacks on low-hanging fruit, 2022 will bring new strategies for ransomware operators, said Tenable vice president of operations technology Marty Edwards.
“They will get more selective about their targets, aiming to strike a balance between making money and dodging a target on their back from law enforcement. In order to outsmart this equation, organisations must stop trying to prevent adversaries’ missions and instead prevent them from being worthwhile.
“In other words, organisations must make sure these missions cost too much to conduct. If the reward doesn’t cover the cost of the investment, threat actors won’t pursue it.”
2. Increased number of intelligent devices will lead to greater cyber exposure
Smart city initiatives, smart building initiatives and efforts to reduce carbon emissions will lead to a proliferation of intelligent devices (IIoT technology) being attached to the internet.
Dick Bussiere, technical director APAC for Tenable, said this trend will be accelerated by the increased capacity and speed of 5G networks.
“Intelligent devices such as sensors, lights, meters are indirectly being connected to critical infrastructure and controlled through secure remote access,” he said.
“These intelligent devices serve as the eyes and glue by which future smart city initiatives will be linked together. Through actionable information from massive streams of real-time data, critical infrastructure operators will be able to address public health, reduce traffic congestion and manage critical resources such as water, electricity and more.”
Mr Bussiere, who is based in Singapore and oversees the Asia-Pacific region, said there are two broad issues with this from the perspective of cyber security.
“The first is from the nature of 5G networks themselves – 5G brings ‘more and faster’, which means that the ‘value’ of the network to an attacker is increased as more devices become attached. The second broad issue is the security of the ‘IIoT’ devices themselves. Normally, devices falling in this category are inexpensive, may not have had rigorous testing from a security perspective, and may not enjoy vendor support in the long term,” he said.
“Furthermore, they introduce new portals for an attack due to the convergence of IT and OT operations. This naturally leads to a large population of vulnerable devices. Managing this enhanced risk will become a challenge.”