{"id":1106,"date":"2022-01-17T15:44:43","date_gmt":"2022-01-17T15:44:43","guid":{"rendered":"https:\/\/b2btechknowledge.com\/?p=1106"},"modified":"2023-07-31T12:42:06","modified_gmt":"2023-07-31T12:42:06","slug":"dummy-news-2","status":"publish","type":"post","link":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/it-security\/dummy-news-2\/","title":{"rendered":"2022 Cybersecurity Landscape: Ransomware brings the question of when, not if"},"content":{"rendered":"<p>In a world where online presence is necessary, ransomware remains a breathing operative to question its core. Only the most potent ransomware went through organizations radar in the past few years. But the smaller ones were also present to individuals and smaller companies.<\/p>\n<p>The current ransomware situation doesn\u2019t bring up the question of when, not if! Because it doesn\u2019t matter how assured you are of the situation, make sure to take necessary precautions such as backing up essential data, encrypting customer information and the ability to restore in minutes notice.<\/p>\n<p>Year received major headlines in ransomware attacks. Due to the suffocation of coronavirus and workplace moving online, the attack percentage took a considerable gain. Private organizations, individuals, supply chains, logistics and even government agencies failed to tackle the issue.<\/p>\n<p>Recently, a Remote Code Execution (RCE) vulnerability was reported for the Apache logging package, popularly known as the Apache Log4j vulnerability, shaking the ground on ransomware attacks. It was first reported on December 9, 2021.<\/p>\n<p>Within December 10, more than 3.7 million hacking attempts were reported on the exploit. Leading cybersecurity research firm Checkpoint<a href=\"https:\/\/www.checkpoint.com\/latest-cyber-attacks\/critical-vulnerability-in-apache-log4j\/\"> reported<\/a> that 46 per cent of these are from known malicious groups. The Log4j is a known project openly found on GitHub with over 400,000 downloads. The project showcased vulnerability execution but was used massively by malicious attackers.<\/p>\n<p>Meanwhile, experts raised concerns that 2022 will receive more ransomware attacks than its successive year 2021. A careful venture in an online portfolio benefits the cause, but the fact remains. Vulnerability can come from any point, no matter how secure you are. It can get through any company computer and easily infect neighbouring connections.<\/p>\n<p>CNN recently reported \u2018<a href=\"https:\/\/edition.cnn.com\/2022\/01\/16\/politics\/florida-hospital-ransomware\/index.html\">Lock it down and piss people off,\u2019<\/a> which reminds us how bad the situation is. A Florida hospital could become its next latest victim. Still, the quick actions of the hospital IT director stopped it at the doorstep. The 100-bed hospital received an emergency call to connect the charting system with medical histories. Doctors use that charted system to check patients\u2019 medical history.<\/p>\n<p>IT director Jamie Hussey realized why integration would be necessary as an outside vendor maintains it. He quickly turned down the system and later found out the emergency protocol was compromised, thus saving the hospital from a state-of-the-art ransomware attack.<\/p>\n<p>On the flip side of the business, organizations and companies must prepare to go an extensive mile for protecting valuable information. Cyber attacks are consequent, and there is no surety from which side they may occur. It may come from a trusted source, a minor partner or a large one. Whether the source, it should be appropriately verified and monetarized.<\/p>\n<p>There is good news among these; across the board, cybersecurity preparation, adaption and integration are levelling up gradually. Even the most minor position in the company regarding computing is given basic cybersecurity training. The wave of technical formality increases in the big picture, hence proving the point.<\/p>\n<p>Gartner\u2019s Digital Workplace Security team\u2019s director Mark Harris talked about the WannaCry ransomware threat, causing devastating damage across organizations three-four years back. He said, \u2018certainly for the larger organizations; they are prepared &#8211; they are getting better.\u2019<\/p>\n<p>Chief Information Security Officer\u2019s (CISOs) today put reputation on the line rather than keeping things to the norm with experience. When reputation matters, you won\u2019t hesitate to go the extra mile, which is a good thing.<\/p>\n<p>Yet many people do not grasp the full gravity of ransomware incidents and suffer through consequences.<\/p>\n<p>PwC <a href=\"https:\/\/www.pwc.co.uk\/press-room\/press-releases\/two-thirds-of-uk-business-leaders-expect-cyber-security-threat-t.html\">reported<\/a> that over 60 per cent of tech executives expect the number of ransomware incidents to grow in 2022. The US Treasury\u2019s Financial Crimes Enforcement Network (FinCEN) report said that within 2021\u2019s first half, over $600 million of ransomware money was paid.<\/p>","protected":false},"excerpt":{"rendered":"<p>In a world where online presence is necessary, ransomware remains a breathing operative to question its core. Only the most&#8230;<\/p>","protected":false},"author":25,"featured_media":1112,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37,36],"tags":[],"class_list":["post-1106","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2022 Cybersecurity Landscape: Ransomware brings the question of when, not if - Techknowledge<\/title>\n<meta name=\"description\" content=\"In a world where online presence is necessary, ransomware remains a breathing operative to question its core\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/it-security\/dummy-news-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2022 Cybersecurity Landscape: Ransomware brings the question of when, not if - Techknowledge\" \/>\n<meta property=\"og:description\" content=\"In a world where online presence is necessary, ransomware remains a breathing operative to question its core\" \/>\n<meta property=\"og:url\" content=\"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/it-security\/dummy-news-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Techknowledge\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-17T15:44:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-31T12:42:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/pexels-tima-miroshnichenko-5380664-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steph Napier\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steph Napier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/\",\"url\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/\",\"name\":\"2022 Cybersecurity Landscape: Ransomware brings the question of when, not if - Techknowledge\",\"isPartOf\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/pexels-tima-miroshnichenko-5380664-scaled.jpg\",\"datePublished\":\"2022-01-17T15:44:43+00:00\",\"dateModified\":\"2023-07-31T12:42:06+00:00\",\"author\":{\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\"},\"description\":\"In a world where online presence is necessary, ransomware remains a breathing operative to question its core\",\"breadcrumb\":{\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/#primaryimage\",\"url\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/pexels-tima-miroshnichenko-5380664-scaled.jpg\",\"contentUrl\":\"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/pexels-tima-miroshnichenko-5380664-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/b2btechknowledge.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Latest news\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"News\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"IT Security\",\"item\":\"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/it-security\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"2022 Cybersecurity Landscape: Ransomware brings the question of when, not if\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/b2btechknowledge.net\/#website\",\"url\":\"https:\/\/b2btechknowledge.net\/\",\"name\":\"Techknowledge\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/b2btechknowledge.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd\",\"name\":\"Steph Napier\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g\",\"caption\":\"Steph Napier\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2022 Cybersecurity Landscape: Ransomware brings the question of when, not if - Techknowledge","description":"In a world where online presence is necessary, ransomware remains a breathing operative to question its core","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/it-security\/dummy-news-2\/","og_locale":"fr_FR","og_type":"article","og_title":"2022 Cybersecurity Landscape: Ransomware brings the question of when, not if - Techknowledge","og_description":"In a world where online presence is necessary, ransomware remains a breathing operative to question its core","og_url":"https:\/\/b2btechknowledge.net\/fr\/latest-news\/news\/it-security\/dummy-news-2\/","og_site_name":"Techknowledge","article_published_time":"2022-01-17T15:44:43+00:00","article_modified_time":"2023-07-31T12:42:06+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/pexels-tima-miroshnichenko-5380664-scaled.jpg","type":"image\/jpeg"}],"author":"Steph Napier","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Steph Napier","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/","url":"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/","name":"2022 Cybersecurity Landscape: Ransomware brings the question of when, not if - Techknowledge","isPartOf":{"@id":"https:\/\/b2btechknowledge.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/#primaryimage"},"image":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/#primaryimage"},"thumbnailUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/pexels-tima-miroshnichenko-5380664-scaled.jpg","datePublished":"2022-01-17T15:44:43+00:00","dateModified":"2023-07-31T12:42:06+00:00","author":{"@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd"},"description":"In a world where online presence is necessary, ransomware remains a breathing operative to question its core","breadcrumb":{"@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/#primaryimage","url":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/pexels-tima-miroshnichenko-5380664-scaled.jpg","contentUrl":"https:\/\/b2btechknowledge.net\/wp-content\/uploads\/pexels-tima-miroshnichenko-5380664-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/b2btechknowledge.net\/latest-news\/news\/it-security\/dummy-news-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/b2btechknowledge.net\/"},{"@type":"ListItem","position":2,"name":"Latest news","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/"},{"@type":"ListItem","position":3,"name":"News","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/"},{"@type":"ListItem","position":4,"name":"IT Security","item":"https:\/\/b2btechknowledge.net\/topics\/latest-news\/news\/it-security\/"},{"@type":"ListItem","position":5,"name":"2022 Cybersecurity Landscape: Ransomware brings the question of when, not if"}]},{"@type":"WebSite","@id":"https:\/\/b2btechknowledge.net\/#website","url":"https:\/\/b2btechknowledge.net\/","name":"Techknowledge","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/b2btechknowledge.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/6a7239727c022a4b4d2b270aa2640bdd","name":"Steph Napier","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/b2btechknowledge.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ffff1e0b132743587234b20f528e6d20c2dddbd44e4a2ad0a788ffe6e1c4d82d?s=96&d=mm&r=g","caption":"Steph Napier"}}]}},"_links":{"self":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/1106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/comments?post=1106"}],"version-history":[{"count":0,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/posts\/1106\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media\/1112"}],"wp:attachment":[{"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/media?parent=1106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/categories?post=1106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/b2btechknowledge.net\/fr\/wp-json\/wp\/v2\/tags?post=1106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}