{"id":62665,"date":"2022-03-31T11:27:32","date_gmt":"2022-03-31T03:27:32","guid":{"rendered":"https:\/\/mec.ph\/?p=62665"},"modified":"2022-04-07T11:44:47","modified_gmt":"2022-04-07T03:44:47","slug":"cybersecurity-threat-landscape-2022","status":"publish","type":"post","link":"https:\/\/mec.ph\/infographics\/cybersecurity-threat-landscape-2022\/","title":{"rendered":"The Cybersecurity Threat Landscape in the Philippines 2022 (Infographic)"},"content":{"rendered":"\t\t
As a remote working, <\/span>hybrid workplace<\/b><\/a><\/span>,<\/span> and digitalization continue to rise in 2022, the risk of cyberattacks remains high.\u00a0 While these tech trends grow, the amount of data created increases as well. Cyber attackers take advantage of this transitory period through <\/span>data breaches<\/b><\/a><\/span> that <\/span>target <\/span>small and medium-sized organizations<\/span>.\u00a0<\/span>\u00a0<\/span><\/p> \u00a0<\/p> In this infographic, we will be walking you through what the current Philippine cybersecurity threat landscape looks like this year. Afterward, and more importantly, we will show you how you can combat this by deploying a<\/span> zero-trust architecture<\/span><\/b>.\u00a0<\/span>\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t While <\/span><\/span>ransomware<\/span><\/span><\/a> <\/span>is not necessarily a new form of cyberattack, the strategies of bad actors have evolved and continue to seep through the cracks of outdated cybersecurity systems in the Philippines. And in a recent <\/span><\/span>study<\/span><\/span><\/a><\/span>, the ransomware attack volume rose to <\/span><\/span>623.3 million in 2021<\/span><\/span>. This alarming figure is<\/span><\/span> 105% higher<\/span><\/span> than 2020’s numbers.\u00a0<\/span><\/span>\u00a0<\/span><\/p> \u00a0<\/p> Today’s ransomware tactics can be best described as<\/span> <\/span>double-extortion.<\/span><\/span><\/a><\/span> To force organizations to pay the ransom, attackers exfiltrate and take crucial company information. If this <\/span>isn’t<\/span> enough trouble already, they threaten that they would leak or sell the data on the dark web if the victims would not pay within a given time. <\/span><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Malware <\/span><\/span><\/a><\/span>shares an equally intrusive and destructive nature as ransomware and has the same goal of infiltrating and stealing information. With this umbrella term, we will discover, according to the same <\/span><\/span>study<\/span><\/span><\/a><\/span> mentioned earlier, a staggering <\/span><\/span>5.4 billion malware attacks<\/span><\/span> occurred last year. And compared to 2020, malware attacks skyrocketed to<\/span><\/span> 167% in 2021.\u00a0<\/span><\/span>\u00a0<\/span><\/p> \u00a0<\/p> Ransomware and malware typically start with a <\/span><\/span>phishing<\/span><\/span><\/a><\/span> email. Carrying this out will be child’s play and will cost little to nothing for the attackers. And yet, over the years, this strategy has still been so effective in gaining access to an entire corporate network. You can prevent this when you train and educate your workers on how to be aware of this threat. Boost your <\/span><\/span>cybersecurity<\/span><\/span><\/a><\/span> this 2022 to ensure the protection of your people and your company too. <\/span><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Multiple reports forecast that <\/span><\/span>IoT (Internet of things) devices will grow<\/span><\/span><\/a><\/span> from 35.82 billion in 2021 to 75.44 billion by 2025. <\/span><\/span>This is a welcome development towards a more convenient and interconnected world from appliances to smartphones. But on the other hand, bad actors are now switching gears and are finding new entry points to exploit.\u00a0<\/span><\/span>\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t As our work environments evolve and grow, facing this would cause various challenges for IT teams as they try to keep up in protecting as many <\/span>vulnerabilities as possible<\/span> in the best way they can. Experts advise taking a <\/span><\/span>holistic and integrated approach<\/span><\/span><\/a><\/span> to cybersecurity this 2022. This unified approach would be beneficial since this would efficiently defend against the growing number of cyberattacks.<\/span><\/span>\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\tThe Attack Surface is Expanding<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
Rapid Adoption and Migration of Cloud <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t