
Cyberattacks have surged during the COVID-19 pandemic, and this, unfortunately, looks set to continue as the new distributed workforce presents more opportunities of which criminals can take advantage. Hackers will likely continue to exploit any human or technical vulnerabilities and capitalise on the increasingly complex IT requirements of the hybrid work era.
Here, we examine which cyberattacks will likely pose the biggest threat in 2022, but also what IT leaders can do to prevent their organisation falling victim to the next attack.
Supply chain attacks
In 2021, there was a dramatic increase in supply chain attacks – the European Union Cybersecurity Agency (ENISA) reported a four-fold increase in attacks. The nature of these attacks varied but criminals increasingly targeted software supply chains, allowing them to compromise sometimes thousands of victims through a single breach, while also providing them with extensive internal access through the trusted systems.
These attacks are very likely to continue in 2022 as organisations increasingly engage with not just third-party vendors, but also third-party individuals. With the threat exacerbated by the challenges of securing the new distributed landscape, organisations should seriously think about how to ensure their supply chain is as secure as possible.
DNS poisoning attacks
Cyberattacks such as ransomware and phishing attacks garnered headlines in 2021, but alongside those, we’re seeing the emergence of another type of threat: DNS spoofing or DNS cache poisoning.
Research shows that DNS-related attacks are on the rise: 72 percent of organisations surveyed experienced a DNS attack in 2021, with one third of them falling victim to DNS cache poisoning.
These are types of redirect attacks where a cyber-attacker hacks into a user’s domain name system (DNS). For example, the user believes they are visiting website A, but in reality, they are being re-routed to website B. So instead of visiting website A, they are directed to a site that looks like website A, but it’s fake. The user may still be directed to the site they intended, but they will go via another route where all the data they enter can be harvested.
Zero Trust
One method for securing organisations’ valuable systems and data is by implementing a Zero Trust policy. Many organisations will already be familiar with the concept, but 2022 will see Zero Trust gain greater traction among organisations.
Zero Trust plays strongly into the challenges of securing the supply chain, for example, because it is based on not trusting anybody with access to your data or your network until they re-qualify as ‘trusted’ – even if they’re only trusted at that point in time or for a particular activity.
Zero Trust can also mitigate some of the threats associated with remote working, including preventing access to systems and data via unsecured devices in the home running on the same network as a remote corporate device. In effect, Zero Trust creates a cocoon around employees’ activities to ensure any potential cyberattack doesn’t extend beyond that instance.
Security By Design
You might also like
Whenever people make decisions about security, they should always consider building in security from the ground up.
There are two reasons for this. The first is that it’s much easier to design effective, pervasive security at the beginning of any deployment rather than to try and bolt it on when all the decisions have been made. The second reason is that sometimes adding security layers can have an impact on other things, such as user experience. For example, applying filters designed to stop people from visiting certain websites that actually prevent them from accessing perfectly valid business sites.
This is also why security sometimes has a reputation as the department that says ‘no’. The design decisions were perhaps made and then security was added afterwards, leaving the security team with no choice but to say ‘no’ when they spot vulnerabilities.
Additionally, the importance of security must be clearly communicated to employees and stakeholders. It shouldn’t be something that’s done in a vacuum; it should be very clearly communicated that these changes are being made to the IT environment. It is a cultural challenge as much as a technological challenge.
Sssh…Securing the Network While It’s Quiet
The era of hybrid working is upon us. UK Government figures show that 85 percent of individuals want to use a hybrid approach of both home and office working in future. So, while there will be a greater return to office life in 2022, the same levels of activity as before the pandemic probably won’t be seen – there will likely be lower occupancy and less predictable work patterns moving forward.
With many offices running at a much lower capacity and with much less pressure and activity on the network, now is a great opportunity to baseline the environment, spot any potential items that shouldn’t be there and understand where risks might exist.
Think about the devices on the network that have been implemented – they’re doing their job, but are they introducing any risks? Maybe conference room televisions that can connect to the corporate Wi-Fi or even to Bluetooth? There could be all kinds of devices on a corporate network that could be better tuned for security, but it hasn’t happened in the past because no-one’s had the time, or it’s always been too difficult due to too much network traffic with a high number of people in the building.
Organisations are looking to Internet of Things (IoT) technology to help them maintain a comfortable, safe and energy-efficient office environment. Now is the perfect time to optimise the security of those, and any other devices, on the network for 2022.
Laurence Pitt is global security strategy director at Juniper Networks
With Think Cybersecurity for Government just around the corner, some of these topics will be under the spotlight. You can still register for the event here: https://www.thinkcybersecurityforgovernment.com/