MetaBlog

Stay informed about cyber awareness training topics and mitigate risk in your organisation.

Cyber Security Best Practices in 2022

cyber security best practices in 2022

Another year is almost over and there is still no let-up in the level and volume of cybercrime. To mitigate these continued cyber attacks, MetaCompliance suggests five cyber security best practices in 2022.

In 2021, surveys and reports exploring the security landscape offered some stark warnings: IBM recorded in “Cost of a Data Breach Report 2021” that cyber security attacks this year resulted in the highest costs ever associated with data breaches in the 17-years of the report’s history; a further report found that ransomware had almost doubled in the first half of 2021; and phishing continues to be the “top action” variety of attack, according to Verizon, to the point that email security was determined to be the top IT project of the year.

All this activity in the cyber security space sets the scene for what is to come next year and the vulnerabilities your organisation will be up against. Learning lessons from the last few years we can develop some best practices to help our organisation withstand cyber attacks in 2022 and beyond.

Stolen Credentials and Phishing Still Favoured by Cybercriminals

The analyst reports and surveys over the last year have found common ground in stolen credentials that then lead to data breaches. Tactics and techniques are chained together to form the cyber attack:

Phishing of employees leads to stolen credentials that lead to unauthorised access that leads to data breaches, malware, and ransomware infection.

IBM’s Cost of a Data Breach report analysed the data breaches of over 500 organisations. The report found that the repercussions from the COVID pandemic, such as home working and increased use of cloud-based services, have led to increased cyber attacks that were more costly. Much of this was due to IT security being unable to keep up with the sudden shift to new working patterns and technology.

The study found that stolen credentials were the most common cause of data breaches. The report also noted that 82% of individuals reuse passwords across multiple accounts, leading to credential stuffing attacks and account takeover.

In November 2021, industry publication Dark Reading, carried out a survey into the types of cyber-threats over the previous 12-months. The results show that phishing remains the number one cause of a cyber security breach, with over half of companies surveyed revealing they were a victim of a breach that was initiated by phishing.

The human factor has made it into industry analyst reports, year-on-year, and 2022 will likely continue to see social engineering and phishing leading to continued ransomware attacks and cybercrime.

5 Cyber Security Best Practices in 2022

The cyber security best practices in 2022 below offer ways to take on the spectre of cyber attacks, head-on:

1.    Make 2022 the Year Your Security Policies Come to Life

Security policies should not be a tick box exercise. Having a well-thought-through and actionable security policy is the basis for a sound approach to security and the development of a positive security posture.

In 2022, move the security policy dial by engaging your employees in the deployment and enforcement of your policy needs. Policy management software can help you achieve this by engaging your employees with the important aspects of the policy that affect them. A robust and actionable policy will also protect your company’s reputation and standing in terms of security standards and data protection regulations.

2.    Engage Your Staff in the Fight Against Cyber-Threats

The UK’s National Cyber Security Centre (NCSC) has stated:

 “People should be at the heart of any cyber security strategy

2022 needs to be the year where organisations create strength through education.

Your employees are central to the fight against cyber attacks. In the last few years, hackers have leveraged phishing campaigns and other socially engineered scams to successfully trick employees into inadvertently performing tasks on behalf of the fraudster.

These tricks are wrapped up in phishing emails, stolen credentials, social media scams, Business Email Compromise (BEC) scams, and so on. Accidental Breaches are also a common form of data exposure. Whether accidental or deliberate, both cause an organisation embarrassment, costs to rectify, and place them into non-compliance with regulations.

The fight against data breaches and other IT security issues must be performed on both fronts to mitigate insider and external threats. In 2022, make sure your organisation builds a culture where employees understand how security events happen and how to prevent them from harming your company. Build a human firewall based on well-educated employees and your staff will be less likely to pull the security trigger.

3.    Automate Your Security Awareness Training

Automation of security awareness programs allows an organisation to be more efficient and effective in delivering quality security educational content to employees. Automation platforms are designed to set up ongoing training programs that also provide analysis of program metrics to continuously optimise the training. Some advanced security awareness solutions will also centralise and manage phishing simulation exercises to train your staff to spot phishing messages.

4.    Get Smart About Security

Smart security is about taking on the changing threat landscape using adaptive and versatile security solutions.

Be smart about:

Changing threats: security threats are increasingly difficult to detect and prevent. An answer to this is smart security solutions that automatically keep up to date with changes in the cyber-threat landscape. These smart tools use machine learning to adapt to new threats and can be deployed as-a-Service or via an MSP.

Employee login: make sure that, whenever possible, you implement robust login credentials, such as two-factor authentication and risk-based login. These measures are not foolproof but they help to protect access to corporate apps and other resources.

Network and endpoint maintenance: keep all your applications, endpoints, and server software patched and up to date. Set up automated patch management to perform this task so human error is removed from the equation.

5.    Get Skilled-Up

A study by (ISC)2 found that over half of organisations expect increased cyber risk because of staffing challenges. The problem is that many of these challenges are due to the skills gap in cyber security. If you cannot recruit skilled security professionals, there are two options:

  1. Train up your staff: offer all employees ongoing Security Awareness Training to ensure they have the knowledge to help prevent a cyber attack that uses social engineering, phishing or that could be caused by accidental data exposure. Also, offer to send interested employee(s) on cyber security certification courses. These trained employees can help to manage and deploy Security Awareness Training to the rest of the workforce.
  2. Outsource your cyber security needs: specialist companies can offer managed services such as phishing simulation exercises, consultants, and/or can provide support to train staff in security awareness.

Make 2022 the Year You Win Against Cyber-Threats

Cybercriminals keep challenging organisations the world over by taking advantage of employees and business associates. In 2022, focus on changing the dynamics of cyber attacks by reducing staff vulnerabilities and being cyber security smart.

Take 3 Steps To Prove Your Security Awareness Training Is Actually Working

about the author

sharing is caring

Share on linkedin
Share on twitter
Share on facebook

you might enjoy reading these

Request Demo

The personal information that you provide to us in this form will only ever be used by MetaCompliance (as the Data Controller) for the following specifically defined purposes:

  • email you content that you have requested from us
  • with your consent, occasionally email you with targeted information regarding our service offerings
  • continually honour any opt-out request you submit in the future
  • comply with any of our legal and/or regulatory obligations