{"id":19346,"date":"2021-12-08T07:30:00","date_gmt":"2021-12-08T07:30:00","guid":{"rendered":"https:\/\/eodishasamachar.com\/en\/2021\/12\/08\/trend-micro-prediction-report-forecasts-cyber-fightback-in-2022\/"},"modified":"2021-12-08T07:30:00","modified_gmt":"2021-12-08T07:30:00","slug":"trend-micro-prediction-report-forecasts-cyber-fightback-in-2022","status":"publish","type":"post","link":"https:\/\/eodishasamachar.com\/en\/2021\/12\/08\/trend-micro-prediction-report-forecasts-cyber-fightback-in-2022\/","title":{"rendered":"Trend Micro Prediction Report Forecasts Cyber Fightback in 2022"},"content":{"rendered":"<p> \n<\/p>\n<div lang=\"en\">\n<p>HONG KONG SAR &#8211;\u00a0<a href=\"https:\/\/www.media-outreach.com\/\">Media&#13;<br \/>\nOutReach<\/a>\u00a0&#8211; 8 December 2021 &#8211;\u00a0<a href=\"https:\/\/www.trendmicro.com\/\">Trend Micro Incorporated<\/a> (<a href=\"https:\/\/www.google.com\/finance?q=TYO:4704\">TYO: 4704<\/a>;<a href=\"https:\/\/www.trendmicro.com\/us\/about-us\/investor-relations\/index.html\"> TSE: 4704<\/a>),&#13;<br \/>\na global cybersecurity leader, today&#13;<br \/>\npredicted global organizations will emerge more alert and better prepared in&#13;<br \/>\n2022 thanks to a comprehensive, proactive, cloud-first approach to mitigating&#13;<br \/>\ncyber risk.<\/p>\n<p>\u00a0<\/p>\n<p>Research,&#13;<br \/>\nforesight, and automation are critical for organizations to manage risk and&#13;<br \/>\nsecure their workforce. Trend Micro blocked 40.9 billion email threats,&#13;<br \/>\nmalicious files and malicious URLs for customers in the first half of 2021&#13;<br \/>\nalone \u2013 a 47% year-over-year increase. <\/p>\n<p>\u00a0<\/p>\n<p>&#8220;We have more&#13;<br \/>\ncybersecurity researchers embedded across the globe than any competitor, and&#13;<br \/>\nthose insights and discoveries are used widely within the industry and power&#13;<br \/>\nour own product offerings,&#8221; said Tony Lee, Head of Consulting, Hong Kong and Macau,&#13;<br \/>\nat Trend Micro. &#8220;These teams power much of the threat intelligence for which we&#13;<br \/>\nare renowned.&#8221;<\/p>\n<p>\u00a0<\/p>\n<p>Trend Micro&#13;<br \/>\nresearchers predict that threat actors in 2022 will focus ransomware attacks on&#13;<br \/>\ncloud and datacenter workloads and exposed services to take advantage of the&#13;<br \/>\nlarge number of employees continuing to work from home. Vulnerabilities will be&#13;<br \/>\nweaponized in record time and chained with privilege escalation bugs to drive&#13;<br \/>\nsuccessful campaigns, according to the report.<\/p>\n<p>\u00a0<\/p>\n<p>&#8220;It&#8217;s been a&#13;<br \/>\ntough couple of years for cybersecurity teams, disrupted by work-from-home&#13;<br \/>\nmandates and challenged as corporate attack surfaces have exploded in size,&#8221;&#13;<br \/>\nsaid Lee. &#8220;However, as hybrid work emerges and more certainty returns&#13;<br \/>\nday-to-day, security leaders will be able to plot a robust strategy to plug&#13;<br \/>\ngaps and make the bad guys work much harder.&#8221;<\/p>\n<p>\u00a0<\/p>\n<p>IoT systems,&#13;<br \/>\nglobal supply chains, cloud environments, and DevOps functions will be in the&#13;<br \/>\ncrosshairs. More sophisticated commodity malware strains will be aimed at SMBs.<\/p>\n<p>\u00a0<\/p>\n<p>However,&#13;<br \/>\nTrend Micro predicts that many organizations will be ready for the challenge as&#13;<br \/>\nthey build out and implement a strategy to proactively mitigate these emerging&#13;<br \/>\nrisks via:<\/p>\n<ul>\n<li><span style=\"font-size: 1rem\">Stringent server hardening and application control policies to&#13;<br \/>\ntackle ransomware<\/span><\/li>\n<li><span style=\"font-size: 1rem\">Risk-based patching and a high-alert focus on spotting security&#13;<br \/>\ngaps<\/span><\/li>\n<li>Enhanced baseline protection among cloud-centric SMBs<\/li>\n<li>Network monitoring for greater visibility into IoT environments<\/li>\n<li>Zero Trust principles to secure international supply chains<\/li>\n<li>Cloud security focused on DevOps risk and industry best practices<\/li>\n<li>Extended detection and response (XDR) to identify attacks across&#13;<br \/>\nentire networks<\/li>\n<\/ul>\n<p><b><i>To read a full copy of Trend Micro&#8217;s 2022&#13;<br \/>\npredictions report, please visit: <\/i><\/b><a href=\"https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/research-and-analysis\/predictions\/2022\">https:\/\/www.trendmicro.com\/vinfo\/hk\/security\/research-and-analysis\/predictions\/2022<\/a>\u00a0<b><i\/><\/b><\/p>\n<p>\u00a0<\/p>\n<\/p><\/div>\n\n<br \/><a href=\"https:\/\/www.media-outreach.com\/news\/2021-12-08\/109657\/trend-micro-prediction-report-forecasts-cyber-fightback-in-2022\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>HONG KONG SAR &#8211;\u00a0Media&#13; OutReach\u00a0&#8211; 8 December 2021 &#8211;\u00a0Trend Micro Incorporated (TYO: 4704; TSE: 4704),&#13; a global cybersecurity leader, today&#13; predicted global organizations will emerge more alert and better prepared in&#13; 2022 thanks to a comprehensive, proactive, cloud-first approach to mitigating&#13; cyber risk. \u00a0 Research,&#13; foresight, and automation are critical for organizations to manage risk &hellip;<\/p>\n","protected":false},"author":1,"featured_media":19347,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[60],"tags":[],"_links":{"self":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/19346"}],"collection":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/comments?post=19346"}],"version-history":[{"count":0,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/posts\/19346\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media\/19347"}],"wp:attachment":[{"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/media?parent=19346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/categories?post=19346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eodishasamachar.com\/en\/wp-json\/wp\/v2\/tags?post=19346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}