Trend Micro Prediction Report Forecasts Cyber Fightback In 2022

Trend Micro Incorporated today predicted global organizations will emerge more alert and better prepared in 2022 thanks to a comprehensive, proactive, cloud-first approach to mitigating cyber risk.

Research, foresight, and automation are critical for organizations to manage risk and secure their workforce. Trend Micro blocked 40.9 billion email threats, malicious files and malicious URLs for customers in the first half of 2021 alone – a 47% year-over-year increase.

Trend Micro researchers predict that threat actors in 2022 will focus ransomware attacks on cloud and datacenter workloads and exposed services to take advantage of the large number of employees continuing to work from home. Vulnerabilities will be weaponized in record time and chained with privilege escalation bugs to drive successful campaigns, according to the report.

IoT systems, global supply chains, cloud environments, and DevOps functions will be in the crosshairs. More sophisticated commodity malware strains will be aimed at SMBs.

However, Trend Micro predicts that many organizations will be ready for the challenge as they build out and implement a strategy to proactively mitigate these emerging risks via:

  • Stringent server hardening and application control policies to tackle ransomware
  • Risk-based patching and a high-alert focus on spotting security gaps
  • Enhanced baseline protection among cloud-centric SMBs
  • Network monitoring for greater visibility into IoT environments
  • Zero Trust principles to secure international supply chains
  • Cloud security focused on DevOps risk and industry best practices
  • Extended detection and response (XDR) to identify attacks across entire networks

To read a full copy of Trend Micro’s 2022 predictions report, please visit:https://documents.trendmicro.com/assets/rpt/rpt-toward-a-new-momentum-trend-micro-security-predictions-for-2022.pdf

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading