aithority.com Open in urlscan Pro
63.250.43.4  Public Scan

URL: https://aithority.com/security/from-2021-to-2022-the-cybersecurity-outlook-by-knowbe4/
Submission: On November 22 via api from US — Scanned from DE

Form analysis 4 forms found in the DOM

GET https://aithority.com

<form role="search" method="get" action="https://aithority.com">
  <input type="text" name="s" value="" placeholder="Search...">
  <i class="fa fa-search"></i>
</form>

GET https://aithority.com

<form role="search" method="get" class="search-form clearfix" action="https://aithority.com">
  <input type="search" class="search-field" placeholder="Search..." value="" name="s" title="Search for:" autocomplete="off">
  <input type="submit" class="search-submit" value="Search">
</form>

Name: mc-embedded-subscribe-formPOST https://aithority.us15.list-manage.com/subscribe/post?u=f52652c0284c4b870ff234ff6&id=5dcc131c64

<form action="https://aithority.us15.list-manage.com/subscribe/post?u=f52652c0284c4b870ff234ff6&amp;id=5dcc131c64" method="post" id="mc-embedded-subscribe-form" name="mc-embedded-subscribe-form" class="validate" target="_blank"
  novalidate="novalidate">
  <div id="mc_embed_signup_scroll">
    <div class="mc-field-group">
      <label for="mce-EMAIL">Email Address <span class="asterisk">*</span>
      </label>
      <input type="email" value="" name="EMAIL" class="required email form-control" id="mce-EMAIL" aria-required="true">
    </div>
    <div class="mc-field-group">
      <label for="mce-MMERGE1">Type of Newsletter <span class="asterisk">*</span>
      </label>
      <select name="MMERGE1" class="required form-control" id="mce-MMERGE1" aria-required="true">
        <option value=""></option>
        <option value="--Select Type--">--Select Type--</option>
        <option value="Daily">Daily</option>
        <option value="Weekly">Weekly</option>
        <option value="Both">Both</option>
      </select>
    </div>
    <div class="mc-field-group input-group">
      <strong>I am also open to receiving promotional content via email <span class="asterisk">*</span>
      </strong>
      <ul>
        <li><input type="radio" value="Yes" name="MMERGE2" id="mce-MMERGE2-0"><label for="mce-MMERGE2-0">Yes</label> <input type="radio" value="No" name="MMERGE2" id="mce-MMERGE2-1"><label for="mce-MMERGE2-1">No</label></li>
      </ul>
    </div>
    <div id="mce-responses" class="clear">
      <div class="response" id="mce-error-response" style="display:none"></div>
      <div class="response" id="mce-success-response" style="display:none"></div>
    </div> <!-- real people should not fill this in and expect good things - do not remove this or risk form bot signups-->
    <div style="position: absolute; left: -5000px;" aria-hidden="true"><input type="text" name="b_f52652c0284c4b870ff234ff6_5dcc131c64" tabindex="-1" value=""></div>
    <div class="clear"><input type="submit" value="Subscribe" name="subscribe" id="mc-embedded-subscribe" class="button"></div>
  </div>
</form>

GET https://aithority.com

<form role="search" method="get" class="search-form" action="https://aithority.com">
  <input type="search" class="search-field" placeholder="Search..." value="" name="s" title="Search for:" autocomplete="off">
  <input type="submit" class="search-submit" value="">
</form>

Text Content

Artificial Intelligence | News | Insights | AiThority

 * NEWS
 * INTERVIEWS
 * INSIGHTS
   * GUEST AUTHORS
   * AIT STAFF WRITER
 * AI RADAR
   * AI in MARKETING
   * AI in SALES
   * AI in HR
   * IT and DevOps
   * AI in Finance
   * AiThority.com Primers
 * SERVICES
   * Editorial
   * Lead Generation
   * Events
 * RESOURCES



AiThority - Artificial Intelligence | News | Insights | AiThority

Posts

Categories

Tags

 * NEWS
 * INTERVIEWS
 * INSIGHTS
   * GUEST AUTHORS
   * AIT STAFF WRITER
 * AI RADAR
   * AI in MARKETING
   * AI in SALES
   * AI in HR
   * IT and DevOps
   * AI in Finance
   * AiThority.com Primers
 * SERVICES
   * Editorial
   * Lead Generation
   * Events
 * RESOURCES
 * More


[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″
coins=”selected” coins-count=”6″
coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM”
currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=””
scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″
custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom:
0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]



FROM 2021 TO 2022: THE CYBERSECURITY OUTLOOK, BY KNOWBE4

SecurityAIT Featured PostsEnd-point Security
By Sudipto Ghosh On Nov 22, 2021

Share

The Cybersecurity Outlook for 2022 is a massive opportunity for the IT and
dependent industries. There are several trends that have dominated the global
market, especially the African cybersecurity landscape in 2021. The continent
remains a point of investment interest as connectivity and mobility continue to
grow – with only 38% of the population connected, there is massive opportunity
compared with developed markets. This situation has seen a subsequent surge in
investor attention, particularly in the FinTech and telco spaces, and an equally
high, but concerning surge in cybercriminal activity.

Predictions Series 2022: Marketing Leaders Weigh In Future Of Content Experience

“Cybercriminals see the opportunity in this new and formative market too,” says
Anna Collard, SVP Content Strategy & Evangelist at KnowBe4 Africa.

Anna added, “Considering that nearly half of the world’s 1.2 billion people
registered for mobile money are based in Sub-Saharan Africa, and that 63% of the
mobile dollar value is spent in this region, it makes sense that it has become a
hot zone for investors and cybercriminals alike.”

Recently, Kaspersky found out more than 30 million web threats were seen across
South Africa, Kenya, and Nigeria combined between April – June 2021.

As part of the cybersecurity outlook for the region, Bethwel Opil, Enterprise
Sales Manager at Kaspersky in Africa said, “The IT threat landscape is evolving
as more sophisticated technology becomes available. The increase of malicious
URLs in Kenya and Nigeria also indicates how phishing and related malware have
grown in popularity by threat actors in these regions, who are targeting people
working outside of the relative safety of the office network.”

Web threats (attacks launched from online resources) are a category of
cybersecurity risks that may cause an undesirable event or action via the
Internet. A broad scope of dangers fits into this category, including well-known
threats like phishing and computer viruses. However, other threats, like offline
data theft, can also be considered part of this group. Web threats are not
limited to online activity but ultimately involve the Internet at some stage for
inflicted harm.

This trend towards Africa as the lucrative shores upon which these modern-day
pirates beach their ships is one that will likely continue into 2022. Most
countries in the region do not have adequate cybercrime regulations in place and
face significant skills shortages. A low level of general awareness means most
consumers do not know how to ensure that their online behavior is secure and
smart.

Top Predictions: New Network Industry Trends Report Sheds Light On Key NetOps
Priorities For 2021 And 2022

“Another issue is that a significant number of African businesses operate
without basic cybersecurity controls in place” says Collard. “This makes them
all ripe for the picking. A recent study undertaken by Sophos found that 58% of
South African organizations experienced an increase in cyberattacks since the
pandemic and KnowBe4’s September 21 survey showed that 32% suffered a ransomware
attack. What is also a concern is that identity fraud has seen a 337% increase
over the past two years.”

Related Posts

WatchGuard Cloud Adds New Endpoint Security Modules To Further Strengthen Its
Unified Security Platform

Nov 22, 2021

Microsoft SynapseML Launched: A Rebranded Version of Open-source ML Library
MMLSpark

Nov 22, 2021

Appointment Of Danone S.A. CISO To Crossword Cybersecurity Plc Advisory Board

Nov 22, 2021
Prev Next 1 of 3,073

Add to this the recent SABRIC survey that underscored the growing threats of
social engineering across online and mobile banking, and a complex and worrying
picture emerges. The statistics, across the board, point to a consistent
increase in attack numbers and sophistication. They also draw a red line
under Africa – 2022 needs to be the year when the continent ramps up its
cybersecurity efforts to protect citizens and economies.

“Another trend is public awareness,” says Collard. “This has remained consistent
for many years, but it is becoming increasingly clear that educating people
about the risks, and giving them the tools they need to combat the risks, is
critical. If you look at mobile banking fraud, in most cases, the successful
crimes were because of phishing and social engineering tactics.”

“Cyber extortion crime is another major trend. If you look at the ransomware
events that dominated local headlines in 2021 the message is not just that
ransomware can be lucrative, but that cybercriminals are combining various
methods to make their cyber extortion more effective,” says Collard. “Demands
are getting bigger and the impact more pernicious to our economy and society as
a whole.”

In 2022, these attacks are going to worsen and their impact will become
increasingly expensive as criminals up the ante. The groups that perpetrate the
attacks know that this is a lucrative gig, so why would they stop? For the
organization, it could cost them money and reputation. For the public sector, it
could cost citizens access to critical infrastructure, and worryingly, the
public sector is extremely vulnerable.

“Only 30% of the South African public sector feels prepared for the cyber
extortion onslaught,” says Collard. “The fact that the sector admits it is not
prepared for this, and the fact it is an attractive target, means that its
security has to become a priority. There also needs to be more of a focus on
mobile malware and cryptocurrency attacks. These are set to become more targeted
and capable over the next year, so users need to be aware of the risks and the
scams.”

Read more on Cryptocurrency attacks here. 

Finally, 2022 will very likely come with more deep fake technology in social
engineering attacks such as phone phishing. Likewise, the increased use of IoT
devices, often implemented with default passwords and gaping vulnerabilities,
will put organizations at risk.

“What this means for the future is that individuals and organizations need to
expect more high-impact extortion attacks and more data breaches,” concludes
Collard. “It is critical that there is more investment into upskilling and
focuses on collaboration between public and private sectors. Initiatives such as
South Africa’s cybersecurity alliance aim to achieve exactly that.

Uriel Maimon, senior director of emerging technologies at cybersecurity
company PerimeterX, said, “Initially, this appeared to be an issue with
malicious Shadow Code implemented via the WordPress site’s supply chain.
However, in actuality, this is an example of a credential stuffing or brute
force attack against the WordPress admin panel. These bot attacks can lead to
non-obvious implications such as ransomware. To combat attacks like this,
companies need a solution that detects malicious behavior on websites in real
time, identifies sophisticated bot techniques, and blocks automated web attacks.
This includes using machine-learning models, behavior-based and predictive
analytics to detect modern account takeover attacks with the sensitivity to see
patterns in traffic. Leveraging intelligence on your customer account
credentials can be crucial in stopping these attacks before they occur.”

[To share your insights with us, please write to sghosh@martechseries.com]

cryptocurrency attacksIT security architectureKnowBe4RansomwareRansomware
Attacksocial engineering
Share
Sudipto Ghosh
 * 

Sudipto Ghosh is a tech buff with industry-recognized experience in creating B2B
web and technical content for digital agencies and publishers covering the space
in Automotive, Artificial Intelligence, Big Data, Shipping, Metallurgy,
Textiles, Pharma and Health, Media and Entertainment. Apart from digging into
MarTech, HR Tech, SalesTech AI labs and interviewing the C-suite executives,
Sudipto enjoys watching nature and paintings. The darkest gym in the city’s
outskirts is the next best place to track Sudipto on the weekends.

Prev Post

Cybellum And HCL Technologies Partner To Deliver Solutions That Address
Automotive Cybersecurity Risk Assessment And Regulatory Requirements

Next Post

New Research Shows Over 90% Of Providers Want Better Collaboration With Payers

All

You might also like More from author
Security

WatchGuard Cloud Adds New Endpoint Security Modules To Further Strengthen Its
Unified…

AIT Featured Posts

Microsoft SynapseML Launched: A Rebranded Version of Open-source ML Library
MMLSpark

Security

Appointment Of Danone S.A. CISO To Crossword Cybersecurity Plc Advisory Board

Security

Avast Upgrades Browser Extension With Privacy Protection Capabilities

Prev Next


Comments are closed.

NFT

NFT

CasperLabs Partners With Fountainhead Technology Co. to Develop A Jade NFT…

AIT News Desk Nov 19, 2021

NextPlay Launches NextPlay X Soma Labs, An Innovation And Design Lab…

Nov 19, 2021

Reason Launches World’s First NFT Escape Room

Nov 19, 2021

Binance Labs Makes Strategic Investment In MOBOX To Bring The Gaming…

Nov 19, 2021
Prev Next 1 of 44
Follow Us


AiThority.com covers AI technology news, editorial insights and digital
marketing trends from around the globe. Updates on modern marketing tech
adoption, AI interviews, tech articles and events.

Quick Links
 * NEWS
 * INTERVIEWS
 * INSIGHTS
 * RESOURCES
 * EVENTS
 * CONTACT US

Visit Our Other Sites






Join Our Community
Email Address *
Type of Newsletter * --Select Type-- Daily Weekly Both
I am also open to receiving promotional content via email *
 * Yes No




 * NEWS
 * INTERVIEWS
 * INSIGHTS
   * GUEST AUTHORS
   * AIT STAFF WRITER
 * AI RADAR
   * AI in MARKETING
   * AI in SALES
   * AI in HR
   * IT and DevOps
   * AI in Finance
   * AiThority.com Primers
 * SERVICES
   * Editorial
   * Lead Generation
   * Events
 * RESOURCES

Brought to you by


Copyright © 2021 AiThority. All Rights Reserved. Privacy Policy

 * NEWS
 * INTERVIEWS
 * INSIGHTS
   * GUEST AUTHORS
   * AIT STAFF WRITER
 * AI RADAR
   * AI in MARKETING
   * AI in SALES
   * AI in HR
   * IT and DevOps
   * AI in Finance
   * AiThority.com Primers
 * SERVICES
   * Editorial
   * Lead Generation
   * Events
 * RESOURCES


We store cookies on your computer to improve your experience and provide more
personalized services, both on this website and on other sites. For more
information about the cookies we use, see our Privacy Policy. We won't track
your information when you visit our site. We will have to use at least one
cookie to ensure that you won't have to make this choice
again.AcceptDeclinePrivacy Policy