IoT security, neglected infrastructure, and trust crisis are considered key threats for 2022

1641738825 IoT security neglected infrastructure and trust crisis are considered key

The Information Security Forum predicts emerging threats with a very good track record to date. Get your company ready for these threats.

Armed with a “business state” survey, most companies try to identify gaps for uptake. In cybersecurity, that's too late. Companies need to stay one step ahead of malicious actors.

Some companies, such as Shell Oil, are notorious for creating a number of potential scenarios for the future and preparing for them all. But with security, that's an almost endless task. It would be a good option to find someone who can predict and prepare for future threats in the present.

SEE: Upcoming Security Risks: What an IT Pro Must Have (Free PDF) (Technology Republic)

That is not as long as it seems.


    The Horizon Threat Report

    The Information Security Forum (ISF) Horizon Threat Report, published annually, predicts these risks:

    • Threat Horizon 2022 (published in 2022) suggested that the blockchain be under attack, turned on to launch fraud and money laundering

    • Threat Horizon 2022 warned that the new biometric and face recognition systems were more prone to error, and easier to deceive, than anyone understood.

    • The 2022 Threat Horizon identified malicious drones as a threat to target attacks

    All three events took place. Most basic blockchain code is open source, and criminal supporters of the blockchain added backdoor theft code to a dependency on which many blockchain systems relied. Facial recognition systems have been horrific, and airports are blocked by drone blocking.

    SEE: Violent force and dictionary attacks: fake page (free PDF) (Technology Republic)

    ISF 2022 Report

    The 2022 report, to be published on Thursday, breaks down the next threat into three categories.

    Aggressive technology is bothering him every day. The Internet of Things (IoT) has brought an incredible number of devices connected to the Internet within the home, enterprise, and public places, many with microphones and video cameras. While we have already seen "Hey Siri" on television triggering the devices at home, the ISF is seeing attacks on those devices directly affecting the physical world. , adversely affecting privacy, security and personal safety.

    READ  Tropical Message sees the climate of our destiny

    Neglected infrastructure is engaged in activity. "Where" the software runs is increasingly cloudy and open to the internet. These systems are also more complex and interleaved, with increasing dependency. That means one failure from any source: human, natural, catastrophic, or malicious - it can cause service disruption. At the same time, more and more customers are expecting a 24/7 campaign. Actors can take advantage of this elevated attack surface to steal data or cripple activity.

    Crisis of trust weakens digital business. The ISF sees the first two cases creating major and public failures. Think of banks or insurance companies that are "losing" or "leaking" money or messenger information. That can lead to a lack of confidence in the new, growing cloud computing infrastructure, in brand reputation, or even in the reputation of the officers who run the company. Even a company that succeeds in maintaining integrity, has confidence in the right infrastructure and hires the right employees because a crisis of trust is hampering its digital business potential to do.

    SEE: Top 10 most important cyber attacks of the decade (Free PDF) (Technology Republic)

    ISF goes into much more detail about certain types of malicious actors, from robo helpers (defined as network-connected autonomous agents) crawling for data to fakes deep ”which is virtual digital content, manipulated by artificial intelligence to make it credible, the worst kind of“ fake news ”.

    Steve Durbin, ISF managing director, explained how work should be accelerated in this way: “There is value in considering future scenarios, planning for those situations and, more importantly, 'engage with cross-organizational teams in discussing the response playbook. shed light on the need for scenario planning for business continuity, and many organizations are already reviewing the risk scenario and assessing future responses not only to the pandemic but also to other emerging risks. emerging. to play in this debate. "

    See also

    Email notification alert on laptop, computer screen showing malware or virus alerts.

    Image: Sompong Lekhawattana, Getty Images / iStockphoto

    Related Posts

    Deja una respuesta

    Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *


    We use cookies to ensure that we give the best user experience on our website. If you continue to use this site we will assume that you agree. More information