Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022

  /     /     /  
Publicated : 23/11/2024   Category : security


Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022


Researchers outline cybersecurity threats they predict businesses will face in two years as technology evolves.



Outdated infrastructure, Internet of Things threats, the proliferation of technology, and Internet trust are among the issues that experts predict will cause the biggest problems for security pros by 2022. Businesses will face crises as attackers exploit immature technologies and unprepared victims.
The Information Security Forums (ISF) Threat Horizon 2022 outlines nine threats, broken into three themes, that organizations can expect to face in two years. ISF has been releasing these reports for more than a decade to help security practitioners prepare for the years ahead.
The main purpose of the Threat Horizon is to allow organizations to have the risk discussion, assess vulnerabilities, and have a common set of potential threats they can discuss across the business, explains ISF managing director Steve Durbin. Sometimes, he says, a threat predicted to affect businesses in one year may evolve to become a different kind of threat in two years. ISF saw this with biometrics, which were predicted to offer a false sense of security in 2020.
Now were seeing a new threat around biometrics, Durbin says. What weve seen more recently is the impact of biometrics, or the threat in the way biometrics are used and stored, he explains, referring to social medias collection of facial data as an example. In 2018, ISF predicted artificially intelligent malware would amplify attackers capabilities; its latest report anticipates businesses will need to worry about AIs role in creating deepfakes on the Internet.
Not only is it an issue in malware, but its also turning up in the way digital content can be manipulated by AI and undermine digital communications, Durbin explains. The threats in ISFs report shouldnt be viewed in isolation; they can be combined to create much deeper issues.
The first theme outlined in
ISFs 2022 report
points to invasive technology disrupting everyday life. Its about our total dependence on technology, Durbin explains. Theres really very little anyone does now without some element of technology involved in it. More devices are now equipped with cameras and/or microphones, and there is a constant stream of data passing between the digital and physical worlds. This proliferation of data creates challenges to privacy, to securing personal information, and to the way in which people begin to behave.
This theme underpins three specific threats, ISF explains. Experts predict augmented reality technology will create new opportunities for businesses, and also for attackers who want to compromise individuals privacy by exploiting systems and devices. They also expect poorly secured, semi-autonomous robots in the workplace will be weaponized to steal corporate IP.
The third prediction related to behavioral analytics, which ISF believes will create a consumer backlash. Businesses using a connected network of devices to develop behavioral analytics will face harsher scrutiny as this practice is considered invasive and unethical. Our smartphones, closed-circuit TV cameras, and public Wi-Fi are collecting unprecedented amounts of data about our lives.
It builds up this huge picture of an individual that can be used not just by attackers but by governments and organizations, says Durbin of this personal data. Understanding all of that, really, I think transforms the way in which we view technology and our use of it. As people recognize the value of their data, they will demand greater transparency in data collection.
Are they currently aware of how their data is collected and used? Durbin says no. I dont know the majority of the public have gotten to that point, he says.
How Forgotten IoT Exacerbates Security Risk
The second overarching theme relates to how outdated infrastructure will put businesses at risk. Experts predict that edge computing for industrial processes connected to the IoT will be a natural architectural choice for organizations but will become a key target for attackers, creating several points of failure and canceling the benefits of traditional security strategies.
In terms of connected devices, Durbin says the real challenge will be the forgotten IoT, a term he uses to describe poorly secured, unpatched, network-connected devices that could put businesses at risk. The IoT is not new, he emphasizes, and there are billions of devices that have been connected to networks for years and abandoned.
I think people are very much more aware of the fact they need to have things like an IoT asset inventory when they put these devices out into industry, in particular, he says. Larger-scale firms, especially in the industrial space, have begun incorporating IoT sourcing strategies and rigorous procurement processes. Still, old systems will continue to pose problems. Were in a better place going forward than we ever were, but were having to deal with legacy, he adds.
Business to Face A Crisis of Trust
As previously mentioned, ISF predicts organizations will be challenged by a proliferation of manipulated digital content, which could be used to spread disinformation and undermine trust in organizations. Those that dont adopt transparency or use technology in unethical ways will be targeted by activists who seek to expose their abusive behaviors.
As a new generation of employees enters the workplace, ISF anticipates they will bring a new attitude and approach to cybersecurity. I dont know that any one of them is better than the rest, says Durbin of generational gaps. I think theyre different, and I think they put challenges on the organization to have effective security awareness and training programs.
Generation Z, the newest group to enter the workforce, has spent the majority of their lives online. They do things differently than the employees a generation older than them. Thats fine, Durbin says, but it demands security teams ask new questions: What is the likelihood that someone used to skimming the Internet will spot a phishing scam? How susceptible will they be to social engineering attacks?
You need to think about the user, rather than think about organizationwide policies, he says. Most policies in place have followed a standard, and new employees with new attitudes could prompt businesses to rethink the standards they have in place. After all, Durbin adds, you cant change an entire generation of workers.
Related Content:
9 Security Podcasts Worth Tuning In To
State of Cybersecurity Incident Response
5 Things Ransomware Taught Me About Responding in a Crisis
Cybersecurity Prep for the 2020s
A listing of 
free products and services
 compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022