Watch Out! Cybercriminals are Coming

January 5th, 2022   |     |  security & compliance

As more coordinated cyberattacks and the sudden move to a remote workforce makes it imperative that security professionals expand their view of what needs to be protected.

Cybercrime is a business, so we all should be aware that cybercriminals act as other businesses do. Taking the global economic environment and current market conditions into consideration, cybercriminals will, of course, continue to focus on their efforts to generate revenue streams. During 2021, we saw cybercriminal individuals and groups partner together to try to maximize their return on investment with their attacks. This means they are able to coordinate attacks against high-value individuals as well as large enterprise organizations.

I envision we will also see an increase in insider threats being used as a support vehicle to execute attacks. Employees are estimated to have been responsible for 33% of breaches in 2021. A comprehensive security program incorporates the measurement and management of accidental behavior activity to constant risky behavior and/or activities.

The key message here is no one individual nor industry is exempt from these threats, and it requires constant focus, assessment and review to ensure you and your critical information assets remain safeguarded and protected against attacks.

The business disruption caused by COVID-19 has accelerated the need for digital transformation within all business sectors. Though many smaller organizations might have planned to replace manual processes with digital processes, time and money often prevented them from moving forward. Because the pandemic forced them out of their offices, many had to quickly scramble and accelerate their digital transformation.

The fundamental security requirement is to understand who and what is trying to access technology environments and data stored within. The lockdowns and the return-to-work regulations have required organizations to put hybrid operating models in place that cater for both office and remote working. Organizations that relied on users only being able to access resources from within the office no longer have this level of control. Systems that were only available from within the internal network are now having to be accessed externally. This change has further highlighted the importance of identity and access management (IAM) to support businesses through this transformation.

As a result of this need to expand access yet keep data secured, we are seeing an increase in businesses reaching out to us as industry experts to partner on identity and access management. As an IAM provider, we are keenly aware that many industries are subject to both regulatory and compliance requirements and work to ensure that our customers understand how utilizing an IAM platform can help them fulfill their requirements.

Alicia Townsend, Dir. of Content and Documentation
About the Author

For almost 40 years, Alicia Townsend has been working with technology as both a consultant and a trainer. She has a passion for empowering others to use technology to make their lives easier. As Director of Content and Documentation at OneLogin, Ms. Townsend works with technical writers, trainers and content marketing writers to inspire and empower everyone to take advantage of what OneLogin’s platform has to offer them.

View all posts by Alicia Townsend

Alicia Townsend, Dir. of Content and Documentation
About the Author

For almost 40 years, Alicia Townsend has been working with technology as both a consultant and a trainer. She has a passion for empowering others to use technology to make their lives easier. As Director of Content and Documentation at OneLogin, Ms. Townsend works with technical writers, trainers and content marketing writers to inspire and empower everyone to take advantage of what OneLogin’s platform has to offer them.

View all posts by Alicia Townsend

Secure all your apps, users, and devices