The digital transformation has been quickly driven by Covid-19 and the need for professionals working in workshops to do it remotely in their homes. This has led to the creation of millions of connected workshops around the world.

Due to this, it is not surprising that data breaches have grown in volume and complexity in 2020, since the number of breaches increased by 273% in the first quarter compared to 2019 .

All over the world, data capture set a record in the first half of 2021 : 304.7 million ransomware attempts were detected in the half, while the total figure for 2020 was below, with 304.6 million, according to data from the cybersecurity company SonicWall , published in July 2021.

In this report, Brazil ranks fifth on the list of countries with the highest number of attacks.

The most surprising thing is that a solo hacker robot 34 million user records from different companies in 2020.

Remote work has created new opportunities for hackers to exploit vulnerable devices and networks of employees. For that reason, McKinsey & Company has estimated that the digital transformation has advanced something like seven years in just a few months.

Follow this article until the end to find out about the main cybersecurity trends for 2022!

Also read: How to guarantee data security in the cloud?

 

Cybersecurity trends for 2022

The volume of stored data will be even greater in the coming years

The world 200 zetabytes of data by 2025 , according Cybersecurity Ventures . This unimaginable total includes data stored in private and public IT infrastructures, public service infrastructures, cloud data centers and personal devices.

Cybersecurity trends for 2022

Infographics created by Cybersecurity Ventures to represent the increase in data volume.

Among the influences for which this is happening are the digital transformation and the business model of companies, with more people who do business using the Internet as the main data transaction channel. Our way of life is increasingly online and the trend is likely to continue.

Therefore, it is clear that protecting this data from attacks is not an easy task, especially when there are so many different types and security standards on devices. Hay to look for more advanced solutions.

The increase in online transactions becomes a blank for cyber threats

During the pandemic, consumers have drastically shifted towards online channels. In turn, companies and commercial sectors responded by giving priority to digital.  

This is how those surveyed by Cybersecurity Ventures have demonstrated: they are three times more likely than before the pandemic to decide that at least 80% of their interactions with customers are digital in nature.

In the same way, the increase in the volume of transactions makes the eyes of the delinquents look at these data, increasing the risk. payment data then, when they are used on platforms without optimal security standards , they can be accessed easily .

The trend of cyberdelinquents is to adopt ransomware

According Deep Instinct research study , the use of ransomware increased by 435% in 2020 compared to 2019. The reason is that ransomware has become the preferred weapon of hackers in the digital landscape induced by Covid-19 . The transformation of so many companies that operate predominantly digitally has created more blanks for extortion.

The detail is that the average payment for ransomware has grown to US$234,000 per event, according to cybersecurity company Coveware .

The biggest change in the last two years is that the actors of the threats have realized that their tactics adapt to much bigger companies without increasing much their own efforts.

Experts confirm that investing in cybersecurity is a business decision

We have selected phrases from experts who demonstrate: cybersecurity is linked to business decisions as a whole.

Source: Cybersecurity Is a Business Decision , Published on November 2, 2020, Authors: Paul Proctor and Srinath Sampath

  • “Cybersecurity is a business decision. CIOs must adopt a strategic view of cybersecurity as a business decision that balances protection needs with desired outcomes. The technological, environmental and business factors that drive cybersecurity influence the way in which a cybersecurity program is built in the business context. Confidence and resistance are integrated into security and business results”.
  • “Develop the way in which you measure and report security to reflect the levels of protection of your key commercial results. Ensure that your cybersecurity controls are consistent, adequate, reasonable and effective. Treat security as a commercial decision”.

Source: Top Strategic Technology Trends for 2021: Cybersecurity Mesh , published on February 4, 2021, written by Jay Heiser and Felix Gaehtgens

  • “Cloud computing offers the scalability and accessibility needed to host security services that can reliably and comfortably support a global cybersecurity fabric. Offering technology as a service means that the provider is responsible for maintenance and routine updates. The cybersecurity team of the company can focus on the maintenance of the policy and let the provider worry about the fontanería. Gartner research indicates that 80% of organizations expect to use security as a service by 2023.”

Why are companies migrating to the cloud and how does this relate to cybersecurity?

As your data is stored in the cloud, you can access them without caring what happens to your machine. You can even remotely erase the data of the lost devices so you don't fall into the wrong hands.

In this case, it brings two important aspects:

Automation of the Security Process

The experienced lack of security personnel should lead organizations to rely more and more on the automation of the security process. The automation tools guarantee continuous and automated security operations based on pre-established rules and procedures.

Así, las security tasks can be carried out quickly, efficiently and with less possibility of error.

Data privacy as a focus

With the growing concern for management and data security, privacy must form part of compliance requirements. In the cloud, this is already being defined as a discipline of its own and increasingly important to maintain cybersecurity.

Remember that data privacy affects almost all aspects of an organization, from corporate strategy management to security, human resources, governance and procurement. But with the cloud it is much easier to fulfill the requirements of the General Data Protection Act (LGPD) .

Now that you know everything about cybersecurity and how the cloud works to guarantee a high level of security, migrate your system to the cloud in a few hours and reduce your IT costs by up to 70% with Sky.One !

 

Written by

Sky.One Team

This content was produced by SkyOne's team of cloud and digital transformation experts.