2022 Predictions, Part 2: Post-COVID Business Demands

We made a few cybersecurity predictions for 2022 in our previous blog. To predict those cybersecurity trends, we looked to the recent past. Today we’re looking ahead to see what the near future will look like in a post-covid world that has permanently changed the way we do business with each other.

Post-COVID threats will persist and evolve.

Last year’s trends included a variety of security threats that were directly tied to the COVID-19 pandemic. Even when the pandemic finally recedes, those threats will continue to remain. We are seeing increasing use of contactless technologies in airports, retail environments, restaurants, and other public spaces — all of which are vulnerable to cyberattacks. Digital ID schemes such as drivers’ licenses and health care records are becoming more widely used — and remain possible points that can be hacked.

With so many people doing most or all their shopping online now, there is a noticeable increase in the number of invoices, receipts and order confirmations popping up in everyone’s email. Much like phony invoices, fake shipping notifications and updates are finding their way into unsuspecting users’ inboxes. This phishing method can often be more effective, as it relies not on a fake purchase, but on making the user worry that there is a problem with a purchase they know they’ve made.

Demand for multi-cloud will mean demand for new security.

In an increasingly multi-cloud world, traditional perimeter-based security approaches have become obsolete. Cybersecurity challenges will become even more demanding as cloud services become more granular. Organizations are deploying cloud solutions that are increasingly subject to local jurisdiction and regulations. Cloud sovereignty controls are focused on protecting sensitive, private data, and ensuring that data stays under owners’ control. Additionally, organizations will require an increasing awareness of regional security requirements.

Organizations in the government, commercial and non-profit sectors are adopting cloud services from all deployment models — software as a service (SaaS), infrastructure as a service (IaaS) and platform as a service (PaaS). Transitioning your business to the cloud will take time and effort, and you need to have a plan in place for getting your processes, workloads and applications there.

Automation will be highly sought after.

As organizations work to keep the lights on and scrutinize the bottom line, there will be a resulting push for efficiency in security technologies. Security teams will be asked to do more with even fewer resources. 2022 will bring an emphasis on technologies that allow organizations to do more with less, and automation will play a significant role in terms of security innovation. Security Information and Event Management (SIEM) and Log Management services will be in high demand.

If the recent past has shown us anything, it’s that in the end, the organizations that survive are the ones that turn disadvantages into advantages. With extensive experience implementing new technology and cultivating client relationships, V2 Systems can guide you to successful results in leveraging 2022 technology solutions adapted to your business.

 

Since 1995, Manassas Park, VA-based V2 Systems has employed local systems administrators, network engineers, security consultants, help desk technicians and partnering companies to meet a wide range of clients’ IT needs, from research, to implementation, to maintenance. Concentrate on your VISION…We’ll handle the TECHNOLOGY!