{"id":62665,"date":"2022-03-31T11:27:32","date_gmt":"2022-03-31T03:27:32","guid":{"rendered":"https:\/\/mec.ph\/?p=62665"},"modified":"2022-04-07T11:44:47","modified_gmt":"2022-04-07T03:44:47","slug":"cybersecurity-threat-landscape-2022","status":"publish","type":"post","link":"https:\/\/mec.ph\/infographics\/cybersecurity-threat-landscape-2022\/","title":{"rendered":"The Cybersecurity Threat Landscape in the Philippines 2022 (Infographic)"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

The Cybersecurity
Threat Landscape<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t

in the Philippines 2022<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

As a remote working, <\/span>hybrid workplace<\/b><\/a><\/span>,<\/span> and digitalization continue to rise in 2022, the risk of cyberattacks remains high.\u00a0 While these tech trends grow, the amount of data created increases as well. Cyber attackers take advantage of this transitory period through <\/span>data breaches<\/b><\/a><\/span> that <\/span>target <\/span>small and medium-sized organizations<\/span>.\u00a0<\/span>\u00a0<\/span><\/p>

\u00a0<\/p>

In this infographic, we will be walking you through what the current Philippine cybersecurity threat landscape looks like this year. Afterward, and more importantly, we will show you how you can combat this by deploying a<\/span> zero-trust architecture<\/span><\/b>.\u00a0<\/span>\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

While <\/span><\/span>ransomware<\/span><\/span><\/a> <\/span>is not necessarily a new form of cyberattack, the strategies of bad actors have evolved and continue to seep through the cracks of outdated cybersecurity systems in the Philippines. And in a recent <\/span><\/span>study<\/span><\/span><\/a><\/span>, the ransomware attack volume rose to <\/span><\/span>623.3 million in 2021<\/span><\/span>. This alarming figure is<\/span><\/span> 105% higher<\/span><\/span> than 2020’s numbers.\u00a0<\/span><\/span>\u00a0<\/span><\/p>

\u00a0<\/p>

Today’s ransomware tactics can be best described as<\/span> <\/span>double-extortion.<\/span><\/span><\/a><\/span> To force organizations to pay the ransom, attackers exfiltrate and take crucial company information. If this <\/span>isn’t<\/span> enough trouble already, they threaten that they would leak or sell the data on the dark web if the victims would not pay within a given time. <\/span><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Malware <\/span><\/span><\/a><\/span>shares an equally intrusive and destructive nature as ransomware and has the same goal of infiltrating and stealing information. With this umbrella term, we will discover, according to the same <\/span><\/span>study<\/span><\/span><\/a><\/span> mentioned earlier, a staggering <\/span><\/span>5.4 billion malware attacks<\/span><\/span> occurred last year. And compared to 2020, malware attacks skyrocketed to<\/span><\/span> 167% in 2021.\u00a0<\/span><\/span>\u00a0<\/span><\/p>

\u00a0<\/p>

Ransomware and malware typically start with a <\/span><\/span>phishing<\/span><\/span><\/a><\/span> email. Carrying this out will be child’s play and will cost little to nothing for the attackers. And yet, over the years, this strategy has still been so effective in gaining access to an entire corporate network. You can prevent this when you train and educate your workers on how to be aware of this threat. Boost your <\/span><\/span>cybersecurity<\/span><\/span><\/a><\/span> this 2022 to ensure the protection of your people and your company too. <\/span><\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

The Attack Surface is Expanding<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Multiple reports forecast that <\/span><\/span>IoT (Internet of things) devices will grow<\/span><\/span><\/a><\/span> from 35.82 billion in 2021 to 75.44 billion by 2025. <\/span><\/span>This is a welcome development towards a more convenient and interconnected world from appliances to smartphones. But on the other hand, bad actors are now switching gears and are finding new entry points to exploit.\u00a0<\/span><\/span>\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

As our work environments evolve and grow, facing this would cause various challenges for IT teams as they try to keep up in protecting as many <\/span>vulnerabilities as possible<\/span> in the best way they can. Experts advise taking a <\/span><\/span>holistic and integrated approach<\/span><\/span><\/a><\/span> to cybersecurity this 2022. This unified approach would be beneficial since this would efficiently defend against the growing number of cyberattacks.<\/span><\/span>\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Rapid Adoption and Migration of Cloud <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t
<\/div>
<\/div><\/div><\/div>
<\/div>
<\/div><\/div><\/div>
<\/div>
<\/div><\/div><\/div>
<\/div>
<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t
<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

In 2020, <\/span>six out of 10 businesses<\/b><\/a><\/span> decided to move their work to the <\/span>cloud<\/span><\/span><\/b><\/a>. In another recent <\/span>report<\/b><\/a> <\/span>published this year, <\/span>63% of SMB workloads and 62% of data<\/span><\/b> will reside in a public cloud within the next 12 months. The numbers show the high level of trust these companies place in cloud computing.<\/span>\u00a0<\/span><\/p>

\u00a0<\/p>

Cloud services and solutions<\/strong><\/a><\/span> exploded in the last few years. Aside from migrating valuable data, many organizations had to speed up migrating entire systems to the cloud.\u00a0<\/span>\u00a0<\/span><\/p>

\u00a0<\/p>

Cloud providers offer a basic level of security, but it would be best not to simply rely on this alone. The responsibility of securing a cloud infrastructure ultimately lies in the organization.\u00a0\u00a0<\/span>\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t

Going Beyond Passwords and Multi-Factor Authentication <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Nowadays, having a simple password isn’t enough as your defense against cybercrime. Multi-factor authentication (MFA) takes a step further by adding a second, third, or more factors to the login process. Some of its <\/span>advantages<\/b><\/a> <\/span>include ease in deployment and keeping accounts secure even if a password has been compromised. But not many companies see its value.<\/span>\u00a0<\/span><\/p>

\u00a0<\/p>

With all the gaps we’ve seen in the current cybersecurity scene in the Philippines, we need a more effective way to keep our data, resources, and people safe. This leads us to the need for a solution that has a fresh approach to the concept of trust.<\/span>\u00a0<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t

\n\t\t\t\t
\n\t\t\t

What is Zero-trust Architecture? <\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

Zero-trust security<\/span><\/span><\/strong><\/a><\/span> is founded on the principle: “never trust, always verify.” This means no one has automatic access to anything. All code, systems, and people are required to request access to data and other assets. This architecture helps proactively protect data with visibility and control that would lessen the burden on overwhelmed IT personnel who had to mitigate every risk and breach in the past.\u00a0<\/span><\/span>
<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t

\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t\t\t\t\t\t\t\"\"\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

By investing in and prioritizing this cybersecurity solution, enterprises would be able to operate more effectively regardless of the circumstances. Other <\/span>benefits <\/b><\/a><\/span>include:\u00a0<\/span>\u00a0<\/span><\/p>

\u00a0<\/p>