• About
  • Subscribe
  • Contact
Wednesday, May 7, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Tactics for tackling cyber threats in 2022

Jeremy Ho by Jeremy Ho
December 22, 2021
Photo by cottonbro from Pexels

Photo by cottonbro from Pexels

2021 looks to be the banner year of cybersecurity attacks as organisations continue their remote ways of working.

Moving into 2022, organisations will face an ever-evolving, more complex cybersecurity landscape. By understanding what the future holds with relevance to cybersecurity threats, organisations can pave their way into tackling these threats head-on when the onslaught arrives.

Human-operated attacks are calling for

Today’s ransomware attacks have become more sophisticated human-operated activities. Actively controlled by human threat actors, this form of ransomware has been able to bypass traditional cybersecurity defences, requiring massive logs and data for post-attack analysis, almost akin to “looking for a needle in a haystack”.

This evolution has led to more organisations deliberating new approaches to cybersecurity, such as adopting deception tactics. Imagine presenting burglars with a posh cabinet overflowing with jewellery, tempting them to pick the lock. However, this is actually a ploy to misdirect the intruders by presenting them with less valuable assets.

Many organisations adopt similar deception ploys, attempting to trick attackers by distributing traps and decoys across a system’s infrastructure to imitate genuine assets while creating a paradigm to hide critical data.

We expect deception technology to continue gaining popularity in the new year as it can act as a magnet to “draw out the needle”, removing threats entirely in real-time. More organisations will also build on identity security programs and existing cybersecurity defences to guard against increasingly sophisticated cyber threats.

Ransomware evolving and becoming more targeted

Every industry is keeping a close watch on ransomware developments. In particular, Active Directory (AD), with all the privileges and credentials that it holds, has become a high-value target for attacks. Yanluowang recently appeared in Asia, the latest targeted ransomware attack that enumerates Active Directory.

Additionally, technologies like cryptocurrencies and blockchain have made it significantly easier for cybercriminals to collect ransoms anonymously from organisations without being traced. With human threat actors able to control malicious software – finding vulnerabilities, overcoming defences, and maximising the impact of their attacks – we expect that attackers will continue to target the bottom line and seek monetary returns.

As ransomware evolves and the stakes rise, more organisations will gear up against ransomware infiltration before it can do excessive damage.

Alliances for forming (from both sides)

Recently, we have witnessed the entrance of a new class of attackers with the formation of criminal groups like DarkSide and REvil gathering individual hackers to strengthen their destructive capability. Notably, criminal group ALTDOS has used double extortion techniques to extract ransom from companies in Singapore, Thailand, and Bangladesh.

With the rising threat of ransomware, organisations and governments are coming together to combat ransomware alongside emerging cybercriminal groups exploiting new opportunities.

Singapore has continuously improved its OT Cybersecurity Masterplan to enhance the security and resilience of Singapore’s critical sectors and strengthen partnerships with stakeholders. Last month, US President Biden gathered officials from 30 countries, including Singapore, to form a Counter-Ransomware Initiative in an alliance to fight against cyberattacks and other cybercrime.

These are the first crucial steps, and we expect to see more regional and international efforts as allies continue to pool resources together to combat this pressing issue.

Identity and trust back in style

Hybrid workplace and technology trends from 2021, such as remote working and the ubiquity of SaaS and IoT, are here to stay. A common thread among these trends includes a need to identify and distinguish unique users and devices as well as threat actors impersonating employees.

Credentials (60%) remain among the most sought-after data types by attackers. Recently, ransomware attacks hit Taiwanese computer giant Acer, reportedly stealing the login details of at least 3,000 Acer retailers or distributors.

With the world re-emerging from the pandemic into a new sense of normalcy, we expect identity and credentials to become even more important. This trend has renewed focus on the zero trust model for identity security, which advocates verifying every user or device while granting just enough access to do their work.

As the work-from-home trend continues, organisations should tightly guard identities and credentials by reducing access to critical corporate data from home and increasing authentication standards. Organisations also need to go through the crisis drill, ramp up monitoring for any suspicious activities within the network, and have a contingency plan to deter cybercriminals.

Regain visibility in the cloud

Over the past year, the rapid deployment and expansion of cloud technology have led to a dangerous level of over-provisioning of the privileges as well as the rise in misconfigurations in the AD, creating vulnerabilities that cybercriminals are only too eager to exploit. These additional attack surfaces and misconfigurations can arise as companies merge and grow in scale while migrating legacy configurations.

Within organisations, business units are also getting powerful, creating their own cloud instances and credentials as they operate. However, creating these instances can open gaps to create cybersecurity loopholes, and security teams are often unaware of these developments.

Many cybercriminals, especially those who have worked in similar organisations, intimately know these too often neglected blind spots. As such, they are targeting these exposed areas as a way to gain entry to the network and access to Active Directory to escalate privileges and gain domain dominance.

In 2022, organisations will increasingly look to tools such as Identity Detection and Response (IDR) solutions to gain visibility to vulnerabilities that exist on-premise, remotely, and in the cloud, rectifying loopholes.

With increased visibility, organisations can define an effective strategy to remove exposures, minimising the time, effort, and cost needed to resolve cybersecurity emergencies.

At present, there is no longer a one-size-fits-all approach to defending against cyberattacks, especially in APAC, where organisations are at different levels of cyber-maturity. APAC organisations must thus understand the cybersecurity landscape and predict its evolution, so they can set up traps and speed bumps along the way to slow down, or even prevent, the next big attack.

Related:  PodChats for FutureCIO: Cybersecurity with software and cloud-first strategies in 2021
Tags: ALTDOSAttivo Networkscyber threatsDarkSideIdentity Detection and ResponseOT Cybersecurity MasterplanransomwareREvilZero Trust Framework
Jeremy Ho

Jeremy Ho

Jeremy Ho is the Vice President of APAC at Attivo Networks, the leader in identity detection and response. With more than 20 years of experience in the cybersecurity space, Jeremy has held various leadership positions with cybersecurity organisations that saw him building regional teams, spearheading new technology offerings, and executing strategies in a diverse Asia Pacific and Japan geography. With an aptitude for analytical thinking to make critical decisions, he seeks and listens to users on their requirements and works towards delivering them.

No Result
View All Result

Recent Posts

  • Agentic AI-powered AppSec platform launched for the AI era
  • IDC forecasts GenAI alone will grow at a 59.2% CAGR
  • Dataiku brings new AI capabilities to create and control AI agents
  • Microsoft reveals the rise of a new kind of organisation in the AI era
  • St Luke’s ElderCare enhances data security and user experience with Juniper

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe