{"id":3674,"date":"2022-02-04T03:38:00","date_gmt":"2022-02-04T03:38:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3674"},"modified":"2026-01-25T07:54:59","modified_gmt":"2026-01-25T07:54:59","slug":"adapting-to-the-threat-landscape-in-2022","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022","title":{"rendered":"Adapting to the Threat Landscape in 2022"},"content":{"rendered":"\n<p>Not only is your organization now more likely to be targeted (and indeed, successfully infiltrated) by cyber criminals \u2013 the impact is also likely to be greater.<\/p>\n\n\n\n<p>This has been seen in the&nbsp;<a href=\"https:\/\/www.businesswire.com\/news\/home\/20211108005775\/en\/Cyber-Threats-Have-Increased-81-Since-Global-Pandemic\" target=\"_blank\" rel=\"noreferrer noopener\">increased cyberattacks<\/a>&nbsp;over the past two years, coupled with record-breaking payouts made by desperate victims of ransomware attacks.<\/p>\n\n\n\n<p>It\u2019s not too difficult to put two and two together: these increases have coincided with the COVID-19 pandemic. The sad fact is, while the virus has been negatively affecting peoples\u2019 health and livelihoods, it\u2019s also had an enormous effect on reshaping the cyber-threat landscape \u2013 not for the better.<\/p>\n\n\n\n<p>As businesses and people have slowly adapted to the new norm, hackers have capitalized on it, and now more than ever are targeting the weakest link in the cybersecurity chain: humans.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Left Weakened \u2013 In More than just Health<\/h2>\n\n\n\n<p>There are the blatantly obvious, and then the slightly more subtle, changes to work-life that have contributed to the more dangerous threat-landscape that we now live in. And although adjustments have been made and the worst is (hopefully) behind us, cyber criminals still seem to be making the most of all the things that have made us more vulnerable throughout the shift:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Increased Online Presence = More Vulnerability<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A huge chunk of the population is now signed up with Zoom, Teams, Skype, Webex Meetings, Google Meet, and any other manner of software that their own organization and others have forced them to adopt in order to keep operating from home. With a hoard of new accounts and associated PII online, videoconferencing applications in particular have become a target for cyber criminals looking to steal data and sell it to the highest bidder.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/1.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Image:&nbsp;<a href=\"https:\/\/www2.deloitte.com\/ch\/en\/pages\/risk\/articles\/impact-covid-cybersecurity.html\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber attacks on video conferencing services, Deloitte.<\/a><\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Transition to Working From Home (WFH)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>With the increased use of personal devices, the same computers used for gaming, streaming and downloading illegal torrents (shhh) are now being used for business purposes \u2013 all these outside-of-work activities leaving the user more exposed to malware through fake sites, malicious downloads, and social engineering tactics. Even for workers within the office, the risk remains high with companies&nbsp;<a href=\"https:\/\/www2.deloitte.com\/ch\/en\/pages\/risk\/articles\/impact-covid-cybersecurity.html\" target=\"_blank\" rel=\"noreferrer noopener\">opting for BYOD<\/a>&nbsp;(Bring Your Own Device) over the more secure and manageable COPE (Corporate Owned, Personally Operated) version.<\/li>\n\n\n\n<li>The lack of security controls in the home office compared to the work office are undeniable. There are no company IT Admins securing the network, updating software, monitoring channels, or supervising privileged activity, and although policies may have been created to crack down on this, they\u2019re much more difficult to enforce remotely.<\/li>\n\n\n\n<li>The unavoidable&nbsp;<a href=\"https:\/\/www.kaspersky.com\/blog\/pandemic-year-in-infosec\/39123\/\" target=\"_blank\" rel=\"noreferrer noopener\">distractions throughout the home<\/a>: spouses, children, pets, visitors \u2013 the kitchen, lounge, or bedroom may now be a shared office, and distractions lead to carelessness and mistakes. Sensitive information is also in greater danger in a shared space without policies enforced and technical measures in place to protect it.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Target on Health Sector<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>With thousands in and out of hospitals, the doctor, signing-up to Health apps, checking-in to locations \u2013 there\u2019s more sensitive data online than ever. Sectors that were previously left alone, even at the beginning of the pandemic, are now a popular target for cyber criminals.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Advanced Social Engineering<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>So much more is now communicated digitally rather than face-to-face. Being overrun with emails increases the chances of clicking on a link that\u2019s less-than-desirable.<\/li>\n\n\n\n<li>Hackers have been getting ludicrously creative in email campaigns, capitalizing on peoples\u2019 fear of the virus or their good natures by posing as government agencies, health sector personnel, or other \u2018typically trustworthy\u2019 pseudonyms and convincing them to click on links, transfer money, or fill out forms with their personal information.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/2.png\" alt=\"\"\/><\/figure>\n\n\n\n<p><em>Image:&nbsp;<a href=\"https:\/\/www2.deloitte.com\/ch\/en\/pages\/risk\/articles\/impact-covid-cybersecurity.html\" target=\"_blank\" rel=\"noreferrer noopener\">Impact of COVID-19 on digital working and cybersecurity, Deloitte.<\/a><\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Stress<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>According to a survey conducted by&nbsp;<a href=\"https:\/\/www.tessian.com\/blog\/why-we-click-on-phishing-scams\/#:~:text=In%20a%20recent%20survey%20conducted,a%20phishing%20email%20at%20work\" target=\"_blank\" rel=\"noreferrer noopener\">Tessian<\/a>, 52% of people said that stress causes them to make more mistakes. With the global pandemic continuing to cause economic pressure, health issues and general unhappiness, you can guarantee that stress levels are high, and cybersecurity has not been at the forefront of peoples\u2019 minds \u2013 and won\u2019t be for a while yet.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Cause and Effect:<\/h2>\n\n\n\n<p>On the other side of the coin, how has the changed landscape been reflected in recent cyberattacks?<\/p>\n\n\n\n<p>The standout effect is undoubtably the colossal monetary amounts being paid by organizations who have been hit with ransomware during the pandemic.<\/p>\n\n\n\n<p>In fact,&nbsp;<a href=\"https:\/\/www.beforecrypt.com\/en\/biggest-ransomware-attacks-ever\/\" target=\"_blank\" rel=\"noreferrer noopener\">7 of the 10 biggest ransomware payouts<\/a>&nbsp;of all time (that we know about) have occurred between June 2020 (i.e., the earlier days of the pandemic) and today:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2020\/06\/29\/the-university-of-california-pays-1-million-ransom-following-cyber-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\">University of California San Francisco (UCSF), June 2020: $1.14 million<\/a>. The varsity\u2019s School of Medicine was targeted by Netwalker, and by the time the infection was contained, it had already fully encrypted their servers.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.computerweekly.com\/news\/252498463\/Retailer-FatFace-pays-2m-ransom-to-Conti-cyber-criminals\" target=\"_blank\" rel=\"noreferrer noopener\">FatFace, January 2021: $2 million<\/a>. Conti ransomware gang targeted the retailer and initially demanded $8 million, but were negotiated down to $2 million \u2013 still a substantial amount.<\/li>\n\n\n\n<li>CWT Global, July 2020: $4 million. The hackers reportedly brought down 30,000 computers of the US travel company and stole 2 terabytes of data, demanding a $10 million ransom for its return before being negotiated down to $4 million.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.bbc.co.uk\/news\/business-57178503\" target=\"_blank\" rel=\"noreferrer noopener\">Colonial Pipeline, May 2021: $4 million<\/a>. DarkSide got their way with the gas company who had to shut down their operational technology network to stop the infection spreading. The pressure was felt when the lack of fuel became noticeable throughout the US, and the organization eventually had to pay the ransom after initially stating they wouldn\u2019t.<\/li>\n\n\n\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chemical-distributor-pays-44-million-to-darkside-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\">Brenntag, May 2021: $4.4 million<\/a>. Along with the Colonial Pipeline attack, DarkSide targeted the Brenntag chemical distribution company, stealing 150GB of data and causing major disruption. The original $7.5 million ransom was negotiated down to $4.4.<\/li>\n\n\n\n<li>JBS, June 2021: $11 million. The second-largest known ransomware payout by the US meat supplier after REvil rendered the processing plants that deal with a fifth of the country\u2019s meat supply unusable. The payment was made in order to \u201cshield JBS meat plants from further disruption and to limit the potential impact on restaurants, grocery stores and farmers that rely on JBS.\u201d<\/li>\n\n\n\n<li><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-05-20\/cna-financial-paid-40-million-in-ransom-after-march-cyberattack?sref=ExbtjcSG\" target=\"_blank\" rel=\"noreferrer noopener\">CNA Financial, March 2021: A reported $40 million \u2013 a world record<\/a>. One of the largest insurance companies in the United States reportedly paid the staggering amount to have company data returned and regain access and control of its network after infiltration by Evil Corp.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">Who\u2019s To Blame?<\/h2>\n\n\n\n<p>(Aside from the cyber gangs themselves of course\u2026)<\/p>\n\n\n\n<p>Like all malicious software, ransomware has to get onto the computer before it can do any damage.<\/p>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/www.pcrisk.com\/removal-guides\/14907-phoenix-phobos-ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">most common channels<\/a>&nbsp;seem to be backdoor trojans, fake software update tools \/ cracks, phishing campaigns, and unofficial software-download sources.<\/p>\n\n\n\n<p>These are all methods that humans are susceptible to inadvertently falling victim to \u2013 and have likely become more susceptible to thanks to the changes brought about by the pandemic.<\/p>\n\n\n\n<p>With vulnerable WFH environments, an ever-increasing online presence, advanced social engineering tactics capitalizing on COVID, and \u2018more important things to worry about\u2019 (for the average employee that is), it&#8217;s unsurprising that ransomware actors have been so successful at having their demands met after successful infiltration and debilitating attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Turning the Tables in 2022<\/h2>\n\n\n\n<p>That\u2019s not to say it need continue in the same fashion this year.<\/p>\n\n\n\n<p>Whether your workforce is remote or in the office, a number of organizational measures should be taken to address the critical \u2018human-factor\u2019, including the usual tactics:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Lessen exposure<\/strong>&nbsp;by providing employees with company devices to avoid the added risk of using personal devices for business work.<\/li>\n\n\n\n<li>Only allow&nbsp;<strong>approved software<\/strong>&nbsp;on devices, and ensure settings are configured for maximum security.<\/li>\n\n\n\n<li>Conduct&nbsp;<strong>frequent reviews<\/strong>&nbsp;of cybersecurity measures in-place, as well as Business Continuity and Disaster Recovery plans.<\/li>\n\n\n\n<li>Configure or enforce time-outs or<strong>&nbsp;\u2018Lock before you leave\u2019 policies<\/strong>, to prevent sensitive data being accessed by the wrong people.<\/li>\n\n\n\n<li><strong>Educate your employees<\/strong>&nbsp;about the dangers of clicking email links, visiting suspicious sites, or downloading files, without being 100% sure of their legitimacy.<\/li>\n<\/ul>\n\n\n\n<p>That being said, human error is human error, and as long as there are humans using computers\u2026 well, \u201cto err is human\u201d!<\/p>\n\n\n\n<p>In today\u2019s threat-landscape, it\u2019s na\u00efve to think you can get by&nbsp;<a href=\"https:\/\/www.toptal.com\/insights\/innovation\/fighting-ransomware-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">relying solely on organizational measures like education and attempting to enforce policy<\/a>. What\u2019s needed is an extra layer: the deployment of advanced technology to act as the \u2018safety net\u2019 for human error.<\/p>\n\n\n\n<p>Admin By Request\u2019s Privileged Access Management (PAM) solution is one such advanced technology that provides protection both in the office and in remote locations, taking a \u2018zero-trust\u2019 approach over a \u2018default access\u2019 one.<\/p>\n\n\n\n<p>The solution revokes administrative rights on endpoints to which it\u2019s deployed and prevents unintentional installation of malicious files through the use of a\u00a0multi anti-virus-engine API\u00a0integration. Ransomware actors, who love to propagate via privilege escalation, can\u2019t spread without swift detection thanks to the software\u2019s logging and alerting capabilities.<\/p>\n\n\n\n<p>Admin By Request adopts the Principle of Least Privilege and Just-In-Time elevation, meaning users don\u2019t lose control; they can still use their personal or company devices as normal \u2013 install software as required \u2013 without the attached risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">We Know We\u2019re Vulnerable \u2013 So Install a Safety Net<\/h2>\n\n\n\n<p>Adapting to today\u2019s threat-landscape means first accepting the post-pandemic working environment, that we\u2019re a lot more vulnerable and, with&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/2021-was-a-terrible-year-for-cybersecurity-without-action-2022-could-be-even-worse\" target=\"_blank\" rel=\"noreferrer noopener\">human error accounting for 90% of security breaches<\/a>, the human factor is critical.<\/p>\n\n\n\n<p>We\u2019re (unintentionally) our own worst enemies, but with organizational measures implemented, education, and an advanced safety net deployed, we don\u2019t have to be labelled as the weakest link in the cybersecurity chain.<\/p>\n\n\n\n<p>Implement your own safety net so that human mistakes don\u2019t have to cost your organization millions. Install Admin By Request, <a href=\"\/en\/freeplandownload\">free for up to 25 endpoints<\/a>, and see how we can help your humans today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The whole world has been left vulnerable amid the global Coronavirus pandemic, but at the same time there\u2019s been a cybersecurity pandemic raging, with ransomware payouts repeatedly surpassing the $2 million mark. Safe to say, the two very different things are likely related.<\/p>\n","protected":false},"author":2,"featured_media":3675,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[143,130,131,141,80,90,140,129,106,82,79,139,142],"ppma_author":[10],"class_list":["post-3674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-143","tag-antimalware","tag-antivirus","tag-covid","tag-current-events","tag-cyber-criminal","tag-cyber-threat","tag-cyberattack","tag-features","tag-malware","tag-ransomware","tag-threat","tag-threat-landscape","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"The whole world has been left vulnerable amid the global Coronavirus pandemic, but at the same time there\u2019s been a cybersecurity pandemic raging, with ransomware payouts repeatedly surpassing the $2 million mark. Safe to say, the two very different things are likely related.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"2022,antimalware,antivirus,covid,current events,cyber criminal,cyber threat,cyberattack,features,malware,ransomware,threat,threat landscape\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Adapting to the Threat Landscape in 2022 \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"The whole world has been left vulnerable amid the global Coronavirus pandemic, but at the same time there\u2019s been a cybersecurity pandemic raging, with ransomware payouts repeatedly surpassing the $2 million mark. Safe to say, the two very different things are likely related.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-02-04T03:38:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:54:59+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Adapting to the Threat Landscape in 2022 \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"The whole world has been left vulnerable amid the global Coronavirus pandemic, but at the same time there\u2019s been a cybersecurity pandemic raging, with ransomware payouts repeatedly surpassing the $2 million mark. Safe to say, the two very different things are likely related.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022#blogposting\",\"name\":\"Adapting to the Threat Landscape in 2022 \\u00bb Admin By Request\",\"headline\":\"Adapting to the Threat Landscape in 2022\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Original-03Darker.png\",\"width\":2560,\"height\":838,\"caption\":\"Orange and black artwork consisting of arrows and a shield.\"},\"datePublished\":\"2022-02-04T03:38:00+00:00\",\"dateModified\":\"2026-01-25T07:54:59+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022#webpage\"},\"articleSection\":\"Blogs, 2022, Antimalware, Antivirus, Covid, Current Events, Cyber Criminal, Cyber Threat, Cyberattack, Features, Malware, Ransomware, Threat, Threat Landscape, Steve Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022#listItem\",\"name\":\"Adapting to the Threat Landscape in 2022\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022#listItem\",\"position\":3,\"name\":\"Adapting to the Threat Landscape in 2022\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022\",\"name\":\"Adapting to the Threat Landscape in 2022 \\u00bb Admin By Request\",\"description\":\"The whole world has been left vulnerable amid the global Coronavirus pandemic, but at the same time there\\u2019s been a cybersecurity pandemic raging, with ransomware payouts repeatedly surpassing the $2 million mark. Safe to say, the two very different things are likely related.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/Original-03Darker.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022\\\/#mainImage\",\"width\":2560,\"height\":838,\"caption\":\"Orange and black artwork consisting of arrows and a shield.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/adapting-to-the-threat-landscape-in-2022#mainImage\"},\"datePublished\":\"2022-02-04T03:38:00+00:00\",\"dateModified\":\"2026-01-25T07:54:59+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Adapting to the Threat Landscape in 2022 \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Adapting to the Threat Landscape in 2022 \u00bb Admin By Request","description":"The whole world has been left vulnerable amid the global Coronavirus pandemic, but at the same time there\u2019s been a cybersecurity pandemic raging, with ransomware payouts repeatedly surpassing the $2 million mark. Safe to say, the two very different things are likely related.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"2022,antimalware,antivirus,covid,current events,cyber criminal,cyber threat,cyberattack,features,malware,ransomware,threat,threat landscape","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022#blogposting","name":"Adapting to the Threat Landscape in 2022 \u00bb Admin By Request","headline":"Adapting to the Threat Landscape in 2022","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/Original-03Darker.png","width":2560,"height":838,"caption":"Orange and black artwork consisting of arrows and a shield."},"datePublished":"2022-02-04T03:38:00+00:00","dateModified":"2026-01-25T07:54:59+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022#webpage"},"articleSection":"Blogs, 2022, Antimalware, Antivirus, Covid, Current Events, Cyber Criminal, Cyber Threat, Cyberattack, Features, Malware, Ransomware, Threat, Threat Landscape, Steve Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022#listItem","name":"Adapting to the Threat Landscape in 2022"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022#listItem","position":3,"name":"Adapting to the Threat Landscape in 2022","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022","name":"Adapting to the Threat Landscape in 2022 \u00bb Admin By Request","description":"The whole world has been left vulnerable amid the global Coronavirus pandemic, but at the same time there\u2019s been a cybersecurity pandemic raging, with ransomware payouts repeatedly surpassing the $2 million mark. Safe to say, the two very different things are likely related.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/Original-03Darker.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022\/#mainImage","width":2560,"height":838,"caption":"Orange and black artwork consisting of arrows and a shield."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022#mainImage"},"datePublished":"2022-02-04T03:38:00+00:00","dateModified":"2026-01-25T07:54:59+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Adapting to the Threat Landscape in 2022 \u00bb Admin By Request","og:description":"The whole world has been left vulnerable amid the global Coronavirus pandemic, but at the same time there\u2019s been a cybersecurity pandemic raging, with ransomware payouts repeatedly surpassing the $2 million mark. Safe to say, the two very different things are likely related.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2022-02-04T03:38:00+00:00","article:modified_time":"2026-01-25T07:54:59+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Adapting to the Threat Landscape in 2022 \u00bb Admin By Request","twitter:description":"The whole world has been left vulnerable amid the global Coronavirus pandemic, but at the same time there\u2019s been a cybersecurity pandemic raging, with ransomware payouts repeatedly surpassing the $2 million mark. Safe to say, the two very different things are likely related.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3674","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":[],"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-25 07:56:23","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2023-05-22 21:59:15","updated":"2026-01-25 07:56:23"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tAdapting to the Threat Landscape in 2022\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Adapting to the Threat Landscape in 2022","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/adapting-to-the-threat-landscape-in-2022"}],"authors":[{"term_id":10,"user_id":0,"is_guest":1,"slug":"steve-dodson","display_name":"Steve Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"Steve","job_title":"","description":"Steve provides research, analysis, insight and commentary on topical issues and events. He lives in New Zealand and has been working at FastTrack Software for 12 years as a cyber security analyst and technical writer."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3674"}],"version-history":[{"count":1,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3674\/revisions"}],"predecessor-version":[{"id":18125,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3674\/revisions\/18125"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/3675"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3674"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}