IT Brief Australia logo
Technology news for Australia's largest enterprises
Partner content
Story image

Forcepoint reveals the top 5 cybersecurity trends to watch out for in 2022

By Contributor
Wed 22 Dec 2021

As we all know, the past two years have changed the way we use technology, and those changes have had a significant impact on the cybersecurity industry. But in the security world, we can never assume that the challenges of the past year are going to be the same ones we face moving forward. 
That’s why Forcepoint has revealed the data protection trends that will shape the cybersecurity landscape in 2022, as part of our Future Insights series. 
We developed the Future Insights to ensure the industry, organisations and individuals can understand the trends and events that will influence cybersecurity over the next 12 months, so that we can build better and continue to protect important data – and the people who rely on it.
Cyberattacks Will Become Part of the Military Arsenal 
While digital weapons have been used for years, we should expect cyberattacks to become a staple of military arsenals in 2022 and beyond. Nation states will look for vulnerabilities in government and critical infrastructure as an alternative to warfare, or as part of it.

Attacking governments or critical infrastructure means attacking everyday citizens in a way that is not as directly lethal as drone strikes or other attacks, but that can still be extremely effective in causing harm and destruction to dictate political outcomes or cause discontent and sow confusion. State and local governments are particularly vulnerable. They often don’t have the cybersecurity budget or technology in place to prevent and respond to ransomware, and typically pay for ransomware without addressing the issue.

Smart cities are also particularly vulnerable to cyberattacks. As more aspects of a traditional city—from transportation to lights to resource management—are connected to the Internet, the more they are at risk of cyber disruption.

The bottom line is that cyber has no borders, and all targets are only a keystroke away.

The Rise of Mass-Market Malicious Updates
In 2022, we expect to see a significant rise in cybercriminals delivering a variety of malware via software updates.
One of the reasons this technique is effective is ‘technical debt’ - or the difference between the ‘price’ (time, human resources, technology investment) a technical project should cost in order to be perfect and future-proofed, and the “price” an organisation is prepared to pay at the time. Products can get behind the curve due to reduced investment, but a lot of this debt centres around applying software updates – absolutely necessary, and so often overlooked.
Even though there is the possibility that malicious may output malware through software updates, IT administrators must keep on top of applying updates and patches as they come in. If technical debt builds, vulnerabilities and security holes will provide a way in for attackers – and the combination of new malware delivery techniques plus unpatched vulnerabilities causes concern.

In addition, with the increase in hybrid working, end users are having to be more responsible for patching and updating their systems. This could lead to either updates not happening at all, or updates being applied by those unused to the task, meaning they are more likely to accept behavior IT teams would spot as suspicious. Leaders should ensure that cybersecurity training is rolled out and regularly updated, to ensure employees act as a first line of defense.

Understanding the Workforce to Better Understand Risk 
To understand risk and implement successful cybersecurity strategies, we must understand what we are protecting and the factors that impact our ability to do so. 
Over the past 18 months, we have seen a rapid deterioration of rules and boundaries in both digital and physical spaces. One of the critical boundaries that has arguably disappeared over this period is the boundary between people and technology. Many people are less interested in maintaining any boundary between their physical and digital lives and are continuously connected to electronic and IoT devices. 

Organisations focused on building resilient security architectures realise that they must understand and protect their assets (both digital and physical), as well as understand their employees.  However, the enmeshment of people and technology has complicated efforts to achieve holistic security coverage using traditional policies and guidelines, since security has traditionally focused on technology rather than people. Efforts to address these challenges have been further complicated by the unplanned transition to working from home, the impact of burnout, and the lack of boundaries between personal and professional lives. 

As we continue forward, we will need help from technology and analytics to learn how to interpret a new world with fewer boundaries. Rather than trying to use technology as a unilateral force to control their workers’ behaviours, companies need to better understand how their people adapt to, respond to, and inform their environments – and begin to implement security practices and tools that work with humans rather than against them.
The Rise of Tractor Hackers 
As industries become more digital, the greater their exposure to threat actors grows. And while it may not be the most obvious industry facing tech threats, farming is under the spotlight for cybercriminals. Many tractors now run more software than a modern car – allowing farmers to run them from an iPad while enjoying a cup of tea.
The growing automation has given rise to precision agriculture and remote farming – but not without its drawbacks. Given the heavy reliance on technology in food and agriculture, could we see hackers bring tractors and food production across parts of the world to a screeching halt in 2022? If we do, unfortunately, we’ll also see large scale disruption of a supply chain that operates under a concise shelf life.

As we incorporate technology into more critical infrastructure, we’ll see the emergence of new technologies as high-value targets for cybercriminals. We welcome automation and greater resource efficiency with open arms, but we can’t digitalise the world without a backup strategy in place for when that technology doesn’t work. We all have a responsibility to plan for going offline or outages. If we don’t consider the potential for widespread disruption, then getting from ‘farm to table’ may take a great deal longer than we expect.

The Curtain Rises on the Age of Prevention 
Global enterprises and governments, both federal and local, have invested billions in trying to detect and thwart ransomware. Detection is an important part of a resilient infrastructure, but it could take six to nine months for us to see data breaches come to light. Obviously, more detection is not the solution. As an industry, we’ve failed at detection. We’ve tried to do it for decades. Every time we innovate, the bad guys find a way to circumvent it.

In recent years we leaned into machine learning and AI-based malware detection tools. Innovations like AI are useful, but the innovation arms race hasn’t eliminated or reduced threats like ransomware. Instead, ransomware attacks continue to escalate in scope and financial impact.

In response, our industry has embraced Zero Trust architectures and explicit-trust approaches, but most Zero Trust journeys have focused largely on identity and access. The recent evolution in hybrid workforces and digital transformation, and their concomitant usage of content and electronic information everywhere, are leading indicators of where Zero Trust must go next: data.

Companies must rethink their perimeter, because the perimeter is now wherever data is used. Put another way: if you focus on authentication and detection, you may be successful at knowing who a person is on the network and what they’re allowed to access. But you might not know what they’re accessing and why.

If we follow Zero Trust, then let’s not trust any of the assets coming into the network in the first place. In a model of 100% prevention, you decide that all content is bad and sanitise everything, regardless of source. 
In 2022, the Zero Trust journey will continue as organisations look to proactively prevent compromise and stop trying to detect or react to threats.

Understanding the emerging data protection and cybersecurity challenges, and creating solutions which can address them, will be key to ensuring the ongoing security of data at every level and touchpoint as we head into 2022.   

The full Future Insights blog series can be found at

Related stories
Top stories
Story image
LG Electronics
LG Electronics brings on Aussie AV distributor Alloys
LG Electronics Australia Business Solutions has appointed Australian AV distributor Alloys as a new distribution partner.
Story image
Sustainability huge factor for APAC data centre managers
A new report reveals that 85% of data centre managers in APAC believe that sustainability will significantly impact operations and decision making.
Story image
Marketing technologies set to increase revenues - study
Marketing leaders say that investment in new marketing technologies (MarTech) will drive significantly increased revenues.
Story image
Aussie businesses buckle down on digital tech investments
Australian businesses are planning major investments in digital technologies to support ambitious expansion plans.
Story image
The next stage for 5G in thermal materials - IDTechEx
IDTechEx says higher frequency deployments, such as mmWave devices and very different station types such as small cells, present their own technological evolution and, with it, thermal challenges. 
Story image
Artificial Intelligence
Dynatrace extends automatic release validation capabilities
Dynatrace has extended its platform release validation capabilities to improve user experience at every stage of the software development lifecycle.
Story image
BT builds on Equinix partnership with new cloud offering
BT has launched a next-generation cloud connectivity offering extending its global network into strategic carrier-neutral facilities (CNFs) and building on its existing partnership with Equinix.
Story image
Bridgestone Australia uses Dematic's AGVs to optimise warehouse operations
Bridgestone Australia has deployed Dematic's Automated Guided Vehicle solution across its new Melbourne warehouse in Truganina.
Story image
Examining the future of ransomware threats with Vectra’s CTO
As customers' valuable data move to the cloud, so will ransomware. What is the current landscape and what do we need to know?
Story image
Tech and data’s role in the changing face of compliance
Accenture's study found that 93% of respondents agree or strongly agree new technologies such as AI and cloud make compliance easier.
WSLHD and PwC’s Consulting Business came together to solve through the challenges of COVID-19. A model of care was developed to the NSW Health Agency for Clinical Innovation guidelines with new technology platforms and an entirely new workforce.
Link image
Story image
Without trust, your security team is dead in the water
The rise of cyberattacks has increased the need for sound security that works across any type of business, but with any change, buy-in is essential. Airwallex explains why.
Digital Transformation
Discover the 5 signs your business is ready for a cloud-based ERP. Is your business being left behind as more of your competitors switch to the cloud?
Link image
Story image
Artificial Intelligence
Accenture shares the benefits of supply chain visibility
It's clear that gaining better visibility into the supply chain will help organisations avoid excess costs, inefficiencies, and complexity to ultimately improve their bottom line.
Story image
Four factors to consider when choosing the right job accounting solution
Progressive job-based businesses can achieve success by strengthening their ability to quantify every cost attributable to the delivery of an outcome for a customer.
Story image
Video: 10 Minute IT Jams - An update from Paessler
Sebastian Krüger joins us today to discuss how unified infrastructure monitoring enables MSPs to seamlessly deliver services to their clients.
Project management
Discover the 4 crucial factors for choosing the right job-costing solution. Is your team struggling to cost jobs and keep projects running on budget?
Link image
Story image
Rubber Monkey gears up for Aussie market with latest capital raise
Rubber Monkey is seeking to raise up to NZ$2.5 million of new capital through online investment platform, Snowball Effect.
Story image
Artificial Intelligence
Siemens expands NVIDIA partnership for industrial metaverse
Siemens is expanding its partnership with NVIDIA to enable the industrial metaverse and increase the use of AI-driven digital twin technology.
Story image
How Airwallex helps businesses achieve globalisation success
As markets continue to shift, businesses need to be able to provide the same quality of service for customers regardless of where they are located around the world.
Story image
Registrations for the W.Media Sydney Cloud and Datacenter Convention 2022 now open
Are you a C-Level executive looking to enhance your knowledge in the cloud and data center space in order to get the best results for your company?
Story image
Data Protection
Five signs your business is ready to move to the cloud
Many organisations are thinking about moving to the cloud. But what are the signs you are ready, and what are the reasons to move?
Story image
Security Information and Event Management (SIEM)
LogRhythm updates SIEM Platform with latest innovations
LogRhythm has announced the launch of version 7.9 of the LogRhythm SIEM Platform and updates to LogRhythm NDR and LogRhythm UEBA.
Story image
Enterprise Resource Planning / ERP
Five ways your ERP is letting you down and why it's time for a change
Wiise explains while moving to a new system may seem daunting, the truth is that legacy systems could be holding your business back.
Story image
Monitors are an excellent incentive for getting employees back
The pandemic has taught us that hybrid working is a lot easier than we would’ve thought, so how can the office be made to feel as comfortable as home? The answer could be staring you in the face right now.
Story image
Ericsson and Ciena, Telstra enhance service capacity for Telstra's optical network
Ericsson, Telstra, and Ciena have announced new enhancements to Telstra's Next Generation Optical Network, which will increase the service capacity of Telstra's optical network to 400 GE (Gigabit per Second Ethernet).
Story image
How New South Wales state departments achieved cloud migration success
State departments in New South Wales are heading to the cloud to achieve better workflow solutions, and one company is paving the way for their success.
Story image
How the metaverse will change the future of the supply chain
The metaverse is set to significantly change the way we live and work, so what problems can it solve in supply chain management?
Story image
MYOB snaps up Sydney-based management software specialists
MYOB has announced the acquisition of Sydney-based business management software and support specialists, GT Business Solutions.
Story image
Thales on recruitment hunt for next disruptive innovations
"Recruiting new talent is part of Thales's belief in the power of innovation and technological progress to build a safer, greener and more inclusive world."
Story image
Document Management
Regaining digital trust and enhancing digitisation in Australian Government agencies
Having a digitised ecosystem of documents, tools and data can help bolster security, improve workflow and ultimately create better services.
Story image
Enterprise service management: the importance of a one-stop shop
In an online world, employees and end-users want one place to go for all their questions and requests. Intranet technology and self-service portals are useful tools that help serve this purpose.
Story image
Your tools, your choice: why allow employees to choose their own devices?
Jamf Australia says giving your team the freedom to work with their digital device of choice could help to attract and retain top talent in a tight labour market.
Story image
Southern Cross Cable
Southern Cross Cable launches the SX NEXT cable to connect NZ to the world
The new Southern Cross NEXT fibre cable (SX NEXT) is set to connect Australasia to the US and further enhance connectivity between New Zealand, Australia, and the US.
Discover the 5 ways your ERP may be letting you down. Is your current system outdated, difficult to manage, and costing you a fortune?
Link image
Story image
Document Management
NZ's FileInvite raises $10M in latest investment round
FileInvite has raised $10 million in Series A investment to fast-forward the extinction of email for requesting and collecting documents online.
Story image
Artificial Intelligence
Eight top DevSecOps trends to support IT innovation in 2022
The use of DevSecOps practices is growing, as it is increasingly seen as the best way to produce high-quality and secure code. So what are the current trends?
Story image
Colt launches new SASE Gateway solution with Versa
Colt Technology Services’ customers now have access to an integrated full SASE solution that brings together SD WAN and SSE features.
PwC's Consulting Business and PwC's Indigenous Consulting are proud to play an important role in helping Australian Indigenous Mentoring Experience build IMAGI-NATION, a free online university for marginalised communities around the world.
Link image
Story image
Palo Alto Networks' cloud security platform receives IRAP assessment
"We provide help protect all forms of compute, cloud native services and access to data within public and private sectors."
Story image
To win at 5G, telcos must tame their quoting chaos
The catalogs of CSP (communication service providers) market offerings are set to explode as new digital services emerge, powered by B2B2X business models.
Supply chain
Discover the 4 critical priorities for wholesale distribution businesses in FY23. Are you worried about how supply chain issues may affect your business in 2023?
Link image
Story image
ASI Solutions
Western Australia CUA panel picks ASI as preferred supplier
Western Australia's Common User Arrangement (CUA) panel has chosen ASI Solutions as a preferred supplier for device hardware.
Story image
Four things wholesale distributors need to consider for FY2023
In a post-pandemic world, there are many things for a distribution business to juggle. ERP solutions company Wiise narrows down what companies should focus on.