Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/16/2020
05:30 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Neglected Infrastructure, Invasive Tech to Plague Infosec in 2022

Researchers outline cybersecurity threats they predict businesses will face in two years as technology evolves.

Outdated infrastructure, Internet of Things threats, the proliferation of technology, and Internet trust are among the issues that experts predict will cause the biggest problems for security pros by 2022. Businesses will face crises as attackers exploit immature technologies and unprepared victims.

The Information Security Forum's (ISF) "Threat Horizon 2022" outlines nine threats, broken into three themes, that organizations can expect to face in two years. ISF has been releasing these reports for more than a decade to help security practitioners prepare for the years ahead.

"The main purpose of the Threat Horizon is to allow organizations to have the risk discussion, assess vulnerabilities, and have a common set of potential threats they can discuss across the business," explains ISF managing director Steve Durbin. Sometimes, he says, a threat predicted to affect businesses in one year may evolve to become a different kind of threat in two years. ISF saw this with biometrics, which were predicted to offer "a false sense of security" in 2020.

Now we're seeing a new threat around biometrics, Durbin says. "What we've seen more recently is the impact of biometrics, or the threat in the way biometrics are used and stored," he explains, referring to social media's collection of facial data as an example. In 2018, ISF predicted artificially intelligent malware would amplify attackers' capabilities; its latest report anticipates businesses will need to worry about AI's role in creating deepfakes on the Internet.

"Not only is it an issue in malware, but it's also turning up in the way digital content can be manipulated by AI and undermine digital communications," Durbin explains. The threats in ISF's report shouldn't be viewed in isolation; they can be combined to create much deeper issues.

The first theme outlined in ISF's 2022 report points to invasive technology disrupting everyday life. "It's about our total dependence on technology," Durbin explains. "There's really very little anyone does now without some element of technology involved in it." More devices are now equipped with cameras and/or microphones, and there is a "constant stream of data" passing between the digital and physical worlds. This proliferation of data creates challenges to privacy, to securing personal information, and to the way in which people begin to behave.

This theme underpins three specific threats, ISF explains. Experts predict augmented reality technology will create new opportunities for businesses, and also for attackers who want to compromise individuals' privacy by exploiting systems and devices. They also expect poorly secured, semi-autonomous robots in the workplace will be weaponized to steal corporate IP.

The third prediction related to behavioral analytics, which ISF believes will create a "consumer backlash." Businesses using a connected network of devices to develop behavioral analytics will face harsher scrutiny as this practice is considered invasive and unethical. Our smartphones, closed-circuit TV cameras, and public Wi-Fi are collecting unprecedented amounts of data about our lives.

"It builds up this huge picture of an individual that can be used not just by attackers but by governments and organizations," says Durbin of this personal data. "Understanding all of that, really, I think transforms the way in which we view technology and our use of it." As people recognize the value of their data, they will demand greater transparency in data collection.

Are they currently aware of how their data is collected and used? Durbin says no. "I don't know the majority of the public have gotten to that point," he says.

How "Forgotten IoT" Exacerbates Security Risk
The second overarching theme relates to how outdated infrastructure will put businesses at risk. Experts predict that edge computing for industrial processes connected to the IoT "will be a natural architectural choice" for organizations but will become a key target for attackers, creating several points of failure and canceling the benefits of traditional security strategies.

In terms of connected devices, Durbin says "the real challenge" will be the "forgotten IoT," a term he uses to describe poorly secured, unpatched, network-connected devices that could put businesses at risk. The IoT is not new, he emphasizes, and there are billions of devices that have been connected to networks for years and abandoned.

"I think people are very much more aware of the fact they need to have things like an IoT asset inventory when they put these devices out into industry, in particular," he says. Larger-scale firms, especially in the industrial space, have begun incorporating IoT sourcing strategies and rigorous procurement processes. Still, old systems will continue to pose problems. "We're in a better place going forward than we ever were, but we're having to deal with legacy," he adds.

Business to Face A 'Crisis of Trust'
As previously mentioned, ISF predicts organizations will be challenged by a proliferation of manipulated digital content, which could be used to spread disinformation and undermine trust in organizations. Those that don't adopt transparency or use technology in unethical ways will be targeted by activists who seek to expose their abusive behaviors.

As a new generation of employees enters the workplace, ISF anticipates they will bring a new attitude and approach to cybersecurity. "I don't know that any one of them is better than the rest," says Durbin of generational gaps. "I think they're different, and I think they put challenges on the organization to have effective security awareness and training programs."

Generation Z, the newest group to enter the workforce, has spent the majority of their lives online. They do things differently than the employees a generation older than them. That's fine, Durbin says, but it demands security teams ask new questions: What is the likelihood that someone used to skimming the Internet will spot a phishing scam? How susceptible will they be to social engineering attacks?

"You need to think about the user, rather than think about organizationwide policies," he says. Most policies in place have followed a standard, and new employees with new attitudes could prompt businesses to rethink the standards they have in place. After all, Durbin adds, you can't change an entire generation of workers.

Related Content:

A listing of free products and services compiled for Dark Reading by Omdia analysts to help meet the challenges of COVID-19. 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/9/2020
Omdia Research Launches Page on Dark Reading
Tim Wilson, Editor in Chief, Dark Reading 7/9/2020
Mobile App Fraud Jumped in Q1 as Attackers Pivot from Browsers
Jai Vijayan, Contributing Writer,  7/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15105
PUBLISHED: 2020-07-10
Django Two-Factor Authentication before 1.12, stores the user's password in clear text in the user session (base64-encoded). The password is stored in the session when the user submits their username and password, and is removed once they complete authentication by entering a two-factor authenticati...
CVE-2020-11061
PUBLISHED: 2020-07-10
In Bareos Director less than or equal to 16.2.10, 17.2.9, 18.2.8, and 19.2.7, a heap overflow allows a malicious client to corrupt the director's memory via oversized digest strings sent during initialization of a verify job. Disabling verify jobs mitigates the problem. This issue is also patched in...
CVE-2020-4042
PUBLISHED: 2020-07-10
Bareos before version 19.2.8 and earlier allows a malicious client to communicate with the director without knowledge of the shared secret if the director allows client initiated connection and connects to the client itself. The malicious client can replay the Bareos director's cram-md5 challenge to...
CVE-2020-11081
PUBLISHED: 2020-07-10
osquery before version 4.4.0 enables a priviledge escalation vulnerability. If a Window system is configured with a PATH that contains a user-writable directory then a local user may write a zlib1.dll DLL, which osquery will attempt to load. Since osquery runs with elevated privileges this enables l...
CVE-2020-6114
PUBLISHED: 2020-07-10
An exploitable SQL injection vulnerability exists in the Admin Reports functionality of Glacies IceHRM v26.6.0.OS (Commit bb274de1751ffb9d09482fd2538f9950a94c510a) . A specially crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerabi...