Search
00
GBAF Logo
trophy
Top StoriesInterviewsBusinessFinanceBankingTechnologyInvestingTradingVideosAwardsMagazinesHeadlinesTrends

Subscribe to our newsletter

Get the latest news and updates from our team.

Global Banking & Finance Review®

Global Banking & Finance Review® - Subscribe to our newsletter

Company

    GBAF Logo
    • About Us
    • Advertising and Sponsorship
    • Profile & Readership
    • Contact Us
    • Latest News
    • Privacy & Cookies Policies
    • Terms of Use
    • Advertising Terms
    • Issue 81
    • Issue 80
    • Issue 79
    • Issue 78
    • Issue 77
    • Issue 76
    • Issue 75
    • Issue 74
    • Issue 73
    • Issue 72
    • Issue 71
    • Issue 70
    • View All
    • About the Awards
    • Awards Timetable
    • Awards Winners
    • Submit Nominations
    • Testimonials
    • Media Room
    • FAQ
    • Asset Management Awards
    • Brand of the Year Awards
    • Business Awards
    • Cash Management Banking Awards
    • Banking Technology Awards
    • CEO Awards
    • Customer Service Awards
    • CSR Awards
    • Deal of the Year Awards
    • Corporate Governance Awards
    • Corporate Banking Awards
    • Digital Transformation Awards
    • Fintech Awards
    • Education & Training Awards
    • ESG & Sustainability Awards
    • ESG Awards
    • Forex Banking Awards
    • Innovation Awards
    • Insurance & Takaful Awards
    • Investment Banking Awards
    • Investor Relations Awards
    • Leadership Awards
    • Islamic Banking Awards
    • Real Estate Awards
    • Project Finance Awards
    • Process & Product Awards
    • Telecommunication Awards
    • HR & Recruitment Awards
    • Trade Finance Awards
    • The Next 100 Global Awards
    • Wealth Management Awards
    • Travel Awards
    • Years of Excellence Awards
    • Publishing Principles
    • Ownership & Funding
    • Corrections Policy
    • Editorial Code of Ethics
    • Diversity & Inclusion Policy
    • Fact Checking Policy
    Original content: Global Banking and Finance Review - https://www.globalbankingandfinance.com

    A global financial intelligence and recognition platform delivering authoritative insights, data-driven analysis, and institutional benchmarking across Banking, Capital Markets, Investment, Technology, and Financial Infrastructure.

    Copyright © 2010-2026 - All Rights Reserved. | Sitemap | Tags

    Editorial & Advertiser disclosure

    Global Banking & Finance Review® is an online platform offering news, analysis, and opinion on the latest trends, developments, and innovations in the banking and finance industry worldwide. The platform covers a diverse range of topics, including banking, insurance, investment, wealth management, fintech, and regulatory issues. The website publishes news, press releases, opinion and advertorials on various financial organizations, products and services which are commissioned from various Companies, Organizations, PR agencies, Bloggers etc. These commissioned articles are commercial in nature. This is not to be considered as financial advice and should be considered only for information purposes. It does not reflect the views or opinion of our website and is not to be considered an endorsement or a recommendation. We cannot guarantee the accuracy or applicability of any information provided with respect to your individual or personal circumstances. Please seek Professional advice from a qualified professional before making any financial decisions. We link to various third-party websites, affiliate sales networks, and to our advertising partners websites. When you view or click on certain links available on our articles, our partners may compensate us for displaying the content to you or make a purchase or fill a form. This will not incur any additional charges to you. To make things simpler for you to identity or distinguish advertised or sponsored articles or links, you may consider all articles or links hosted on our site as a commercial article placement. We will not be responsible for any loss you may suffer as a result of any omission or inaccuracy on the website.

    1. Home
    2. >Business
    3. >Cybersecurity threats challenging businesses in 2022
    Business

    Cybersecurity Threats Challenging Businesses in 2022

    Published by Jessica Weisman-Pitts

    Posted on November 24, 2021

    5 min read

    Last updated: January 28, 2026

    Add as preferred source on Google
    An informative graph depicting the projected growth of the Health Caregiving Market from USD 233.02 billion in 2025 to USD 521.61 billion by 2032, highlighting a CAGR of 12.2%. This image enhances understanding of the market dynamics discussed in the report.
    Graph illustrating growth of the Health Caregiving Market to USD 521.61 billion by 2032 - Global Banking & Finance Review
    Why waste money on news and opinion when you can access them for free?

    Take advantage of our newsletter subscription and stay informed on the go!

    Subscribe

    Quick Summary

    Ransomware and other cyber threats pose significant risks to businesses in 2022. Effective security controls and staff training are crucial for protection.

    Cybersecurity Threats Businesses Face in 2022

    By Dan Tremeer, NET Reply

    1. What is the top one or two cyber risks to companies right now? 

    Ransomware and the damage it causes is rightly making a lot of headlines right now and is the leading cyber risk to companies. Digging deeper, exploitable risks that require addressing are as follows

    1. There are many security products which do excellent jobs when they are fully configured and wrapped within high quality security operations. A high percentage of attacks are preventable with existing security controls with the right configuration and training of cyber staff. A worrying statistic is that on average it takes a business over 200 days to identify a breach, meaning controls are not effectively identifying bad actors’ presence. It is tough to find initial access and reconnaissance activities which skilled attackers apply.
    2. Security improvements over the past decade mainly focus on technology and tooling, but without providing security awareness to staff who often have access to sensitive data, server access or social media systems, many businesses put themselves at risk, and these staff are seen by attackers as the weak link to access organisations.
    3. Organisational resilience in the face of a major problem is a big problem for many businesses. If attackers were to take offline a major digital supplier for a significant period how many companies can confidently activate their disaster recovery (DR) plans efficiently? The recent Facebook disruption showed how many small businesses were totally dependent on it, and that is nothing compared to those relying on Azure or AWS.

      2. How do bad actors exploit the risk(s)? What techniques do they use?

    There are highly organised crime syndicates with numerous roles of varied sophistication. Gaining legitimate account credentials is the first step, so phishing and credential stuffing are two initial techniques which bear fruit and are sold or passed up the food chain. Bad actors with evasive hacking capabilities gain a foothold into target business they expect will have either highly sensitive data, or cannot operate significantly without their digital infrastructure (health services being one example). With companies offering so many access points for attackers to probe and analyse for weaknesses from the outside, businesses have to consider an attacker will have at least low level credentials, making the typical outside equals bad and inside equals good mindset is not a viable strategy, if it ever was in the first place! Another consideration is how capable a business is to defending against a major attack, this leads to smaller organisations being a tastier target for attackers than you might think. Larger organisations will more likely be able to activate DR, or have better controls to detect and respond.

    1.  How can organisations protect against the risk(s), both with technology and staff education?

    With adversaries becoming increasingly sophisticated and prevalent, modern security services are necessary for businesses to have a chance of successfully defending against persistent attacks across adapting and complex infrastructures. To identify bad actors earlier, Net Reply recommends businesses move to automated, machine learning solutions that leverage real time behavioural analysis and threat intelligence feeds, wrapped with effective controls, processes and staff training. Businesses should develop a data driven approach to understanding the effectiveness of their security controls by continuously testing their infrastructure and people. For the former, continuous security testing is a new service offering which solves many limitations of vulnerability scanning and manual penetration testing. There are a few different names – Threat Modelling, Breach & Attack Simulators (BAS) and Automated Penetration Testing provide consistent and constant testing and many provide clear reporting and remediation support. For the latter, developing a layered security awareness campaign using various formal and non-formal training techniques creates a culture of good security inside the organisation which have far reaching business value such as reduced overheads on service-desk and security staff.

    Businesses also need to test their DR plans and also carry out yearly incident preparedness exercises. Table-top walk-throughs are a minimum level of preparation, but practical testing is more likely to reveal problems. No-one wants to activate untested procedure for the first time during a real and live attack.

    1. How do you see the risk(s) evolving in the coming years?

    Over the past many years it has been demonstrated that crime does pay and Ransomware is likely to continue to be a major risk for businesses and agencies. We are seeing a trend that security vendors are working more collaboratively together to help reduce the impact of bad actors. and it’s now on government leaderships agenda’s so there are some signs it’s getting more attention, relying upon effective state level support is not a recommended strategy however as their chances of eradicating the problem are slim to none. We will see an unprecedented level of technology advancement in many fields which will have an impact on security such as AI, quantum computing etc. which will of course be leveraged by bad actors as well. With everything becoming connected, how long will it be until threat actors figure out ways to disable medical devices such as pace-makers, automatic blood sugar patches or insulin delivery etc. or gain access to a water facility, all could have drastic harmful consequences.

    Businesses are becoming more understanding of the areas of risk they maintain and are doing more about it such as putting assurance and governance processes in place to cover supply chain risk, cyber risk, insider threats, and disaster recovery planning, Staff are having to become more security savvy in their home and digital lives and will welcome having more advice from the business will go a long way to help businesses be more resilient to attackers

    Key Takeaways

    • •Ransomware is the leading cyber risk for companies.
    • •Many attacks are preventable with proper security controls.
    • •Phishing and credential stuffing are common attack techniques.
    • •Smaller businesses are often more vulnerable to attacks.
    • •Automated, machine learning solutions can enhance security.

    Frequently Asked Questions about Cybersecurity threats challenging businesses in 2022

    1What is the main topic?

    The article discusses cybersecurity threats challenging businesses in 2022, focusing on ransomware and other risks.

    2How can businesses protect against cyber threats?

    Businesses can protect themselves by implementing automated security solutions, enhancing staff training, and conducting continuous security testing.

    3Why are smaller businesses more vulnerable?

    Smaller businesses may lack the resources for robust security measures, making them more attractive targets for cyber attackers.

    More from Business

    Explore more articles in the Business category

    Image for Submit Your Entry for Years of Excellence Awards 2026
    Submit Your Entry for Years of Excellence Awards 2026
    Image for Nominations Open for Travel & Hospitality Awards 2026
    Nominations Open for Travel & Hospitality Awards 2026
    Image for Submit Your Entry Today for Telecom Awards 2026
    Submit Your Entry Today for Telecom Awards 2026
    Image for Submit Your Entries for The Next 100 Global Awards 2026
    Submit Your Entries for the Next 100 Global Awards 2026
    Image for Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Submit Your Entry: Public Sector & Governance Excellence Awards 2026
    Image for Nominations Invited for Real Estate Development Awards 2026
    Nominations Invited for Real Estate Development Awards 2026
    Image for Submit Your Entry: Process & Product Awards 2026
    Submit Your Entry: Process & Product Awards 2026
    Image for Call for Entries: HR & Recruitment Awards 2026
    Call for Entries: HR & Recruitment Awards 2026
    Image for Submit Your Nominations Today for Education & Training Awards 2026
    Submit Your Nominations Today for Education & Training Awards 2026
    Image for Join the Corporate Governance Awards 2026: Showcase Your Organisation’s Leadership
    Join the Corporate Governance Awards 2026: Showcase Your Organisation’s Leadership
    Image for Submit Your Entry Today for Business Awards 2026
    Submit Your Entry Today for Business Awards 2026
    Image for Decentralized Masters’ ‘family culture’ building trust instead of hierarchy
    Decentralized Masters’ ‘family Culture’ Building Trust Instead of Hierarchy
    View All Business Posts
    Previous Business PostGet to Know Your IT Admin
    Next Business PostThree Strategies for Any Smb to Get Started With Data Science