{"id":24161,"date":"2022-09-23T11:59:32","date_gmt":"2022-09-23T03:59:32","guid":{"rendered":"https:\/\/www.exabytes.sg\/blog\/?p=24161"},"modified":"2023-07-27T14:05:36","modified_gmt":"2023-07-27T06:05:36","slug":"cyber-security-threats-predictions","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/cyber-security-threats-predictions\/","title":{"rendered":"20 Top Cyber Security Threats in 2022\/2023: Latest Predictions on Cyber Attack Singapore"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24172 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/top-cyber-security-threats-predictions.jpg?resize=696%2C364&#038;ssl=1\" alt=\"Cyber security threats predictions\" width=\"696\" height=\"364\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/top-cyber-security-threats-predictions.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/top-cyber-security-threats-predictions.jpg?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/top-cyber-security-threats-predictions.jpg?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/top-cyber-security-threats-predictions.jpg?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/top-cyber-security-threats-predictions.jpg?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/top-cyber-security-threats-predictions.jpg?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/top-cyber-security-threats-predictions.jpg?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/top-cyber-security-threats-predictions.jpg?resize=803%2C420&amp;ssl=1 803w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n\n<p>According to <a href=\"https:\/\/www.statista.com\/statistics\/1307426\/number-of-data-breaches-worldwide\/#:~:text=During%20the%20second%20quarter%20of,2020%2C%20nearly%20125%20million%20cases.\" rel=\"noopener\">Statista<\/a>, during the second quarter of 2022, internet users worldwide experienced <strong>approximately 52 million cybersecurity threats<\/strong>.<\/p>\n<p>The highest number of data cybersecurity threats were detected in the measured period, with nearly 125 million cases in the fourth quarter of 2020.<\/p>\n<p><span style=\"font-weight: 400;\">Hackers have the ability to reveal personal information and potentially stop business activities for a few hours or days. <\/span><\/p>\n<p>The increasing complexity of this <a href=\"https:\/\/www.exabytes.sg\/blog\/common-cyber-security-threats-should-aware\/\" target=\"_blank\" rel=\"noopener\">cybersecurity threat<\/a> has prompted a number of corporations to crack down on cyber security issues in Singapore, and this back-and-forth struggle defines the current developments in cybersecurity.<\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"https:\/\/aseantechsec.com\/cyber-attacks-in-singapore-up-145\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">AseanTechSec blog<\/span><\/a><span style=\"font-weight: 400;\">, healthcare industry is Singapore&#8217;s most targeted by volume, with an average of <strong>1,998 <\/strong><\/span><strong>cybersecurity threats<\/strong><span style=\"font-weight: 400;\"> per organization, a <\/span><b>111% increase from 2020<\/b><span style=\"font-weight: 400;\"> followed by manufacturing and transportation sector.<\/span><\/p>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24163 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1.jpg?resize=696%2C483&#038;ssl=1\" alt=\"cybersecurity\" width=\"696\" height=\"483\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=1024%2C711&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=300%2C208&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=768%2C533&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=1536%2C1067&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=2048%2C1422&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=218%2C150&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=696%2C483&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=1068%2C742&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=164%2C114&amp;ssl=1 164w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=605%2C420&amp;ssl=1 605w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?resize=100%2C70&amp;ssl=1 100w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-1-scaled.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p><b>Here are 20 Top Cyber Security Issues in Singapore in 2022\/2023<\/b><b><\/b><\/p>\n<h2><b>1. Using Social Engineering<\/b><\/h2>\n<p>Social engineering is one of the most hazardous cybersecurity threats used by cybercriminals. It is far simpler to mislead a person than to compromise a security system. 85% of data breaches involve human interaction, according to <a href=\"https:\/\/www.verizon.com\/about\/news\/verizon-2021-data-breach-investigations-report\" target=\"_blank\" rel=\"noopener\">Verizon&#8217;s Data Breach Investigations report<\/a>.<b><\/b><\/p>\n<h2><b>2. Exposure to Third Parties<\/b><\/h2>\n<p>According to 2021 labor trends research, more than half of employers are more ready to recruit freelancers as a result of COVID-19&#8217;s transition to remote work.<\/p>\n<p>As per a cybersecurity Singapore company <a href=\"https:\/\/www.cyberark.com\/resources\/ebooks\/third-party-privileged-access-to-critical-systems-ebook-1\" target=\"_blank\" rel=\"noopener\">CyberArk<\/a>, 96% of firms give access to these third parties to their vital systems, giving cybersecurity threats an unsecured entry point to their data.<\/p>\n<p>This number is expected to rise in 2022\u20132023.<b><\/b><\/p>\n<h2><b>3. Configuration Errors<\/b><\/h2>\n<p>Even security systems built and configured by professionals almost certainly include at least one mistake that leads to <a href=\"https:\/\/www.exabytes.sg\/blog\/common-cyber-security-threats-should-aware\/\" target=\"_blank\" rel=\"noopener\">cyber security issues<\/a> in Singapore.<\/p>\n<p>A <a href=\"https:\/\/www.lyrahealth.com\/blog\/covid-mental-health-impact-report\/\" target=\"_blank\" rel=\"noopener\">Lyra Health survey<\/a> claims that 81% of employees have dealt with mental health concerns as a result of the pandemic, and 65% of employees claim that their mental health has had a direct influence on how well they function at work.<b><\/b><\/p>\n<h2><b>4. Improper Cyber Hygiene<\/b><\/h2>\n<p>Regular technological usage routines and practices are referred to as &#8220;cyber hygiene,&#8221; such as avoiding open WiFi networks to prevent cybersecurity Singapore and using security measures like <a href=\"https:\/\/www.exabytes.sg\/blog\/mfa-authentication\/\" target=\"_blank\" rel=\"noopener\">multi-factor authentication<\/a> or a VPN.<\/p>\n<p><b>Nearly 60% of businesses rely on employees&#8217; memories to keep track of passwords<\/b><span style=\"font-weight: 400;\">, and <\/span><b>42% use sticky notes<\/b><span style=\"font-weight: 400;\">, which cause <\/span><a href=\"https:\/\/www.exabytes.sg\/cyber-security\" target=\"_blank\" rel=\"noopener\"><b>cyber-attacks Singapore.<\/b><\/a><b><\/b><\/p>\n<h2><b>5. Deficiencies in the Cloud<\/b><\/h2>\n<p>Contrary to popular belief, <a href=\"https:\/\/www.ibm.com\/downloads\/cas\/WMDZOWK6\" target=\"_blank\" rel=\"noopener\">cloud vulnerabilities have risen 150%<\/a> over the previous five years, according to IBM. One may assume that as time goes on, the cloud will get more secure and prevent cyber security issues in Singapore.<b><\/b><\/p>\n<h2><b>6. Smartphone Vulnerabilities<\/b><\/h2>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24100 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490-1024x606.jpg?resize=696%2C412&#038;ssl=1\" alt=\"social media platform\" width=\"696\" height=\"412\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490.jpg?resize=1024%2C606&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490.jpg?resize=300%2C178&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490.jpg?resize=768%2C455&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490.jpg?resize=1536%2C910&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490.jpg?resize=2048%2C1213&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490.jpg?resize=696%2C412&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490.jpg?resize=1068%2C632&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490.jpg?resize=193%2C114&amp;ssl=1 193w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490.jpg?resize=709%2C420&amp;ssl=1 709w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/social-media-phone-scaled-e1663051646490.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>The use of mobile devices will grow in 2022.<\/p>\n<p>Remote users rely more on mobile devices, but pandemic specialists also urged widespread usage of touchless payment methods and mobile wallets, which make smartphones vulnerable to cyber-attack Singapore.<b><\/b><\/p>\n<h2><b>7. Ransomware<\/b><\/h2>\n<p>According to 66% of the <a href=\"https:\/\/www.cybereason.com\/hubfs\/dam\/collateral\/ebooks\/Cybereason_Ransomware_Research_2021.pdf\" target=\"_blank\" rel=\"noopener\">1,263 cybersecurity professionals surveyed in 2021<\/a>, a ransomware attack caused their businesses to lose a considerable amount of income in this cybersecurity threat.<b><\/b><\/p>\n<h2><b>8. Improper Data Management<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Due in part to the exponential growth of data that has occurred over the last decade, experts believe that 2022 will see a greater movement away from &#8220;big data&#8221; and toward &#8220;right data,&#8221; or an emphasis on retaining just the data that is required.<\/span><b><\/b><\/p>\n<h2><b>9. Inadequate Post-Attack Procedures<\/b><\/h2>\n<p>Security flaws must be corrected as soon as possible after a cybersecurity threat.<\/p>\n<p>In a 2021 study of 1,263 organizations that had been targeted in a cybersecurity breach, 80% of the victims that paid the ransom stated they were shortly attacked again.<b><\/b><\/p>\n<h2><b>10. Threats of Geo-targeted Phishing<\/b><\/h2>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-23955 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing.jpg?resize=696%2C481&#038;ssl=1\" alt=\"Malware Phishing Virus\" width=\"696\" height=\"481\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=1024%2C707&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=300%2C207&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=768%2C530&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=1536%2C1061&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=2048%2C1414&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=218%2C150&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=696%2C481&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=1068%2C738&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=165%2C114&amp;ssl=1 165w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=608%2C420&amp;ssl=1 608w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=100%2C70&amp;ssl=1 100w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>Phishing assaults are currently the most prevalent cyber security issue in Singapore in the IT industry, with many people falling victim to <a href=\"https:\/\/www.exabytes.sg\/blog\/dont-fall-for-phishing-scam-emails\/\" target=\"_blank\" rel=\"noopener\">phishing emails<\/a> and malicious URLs that are customized, tailored, and geo-targeted.<b><\/b><\/p>\n<h2><b>11. Attacks on the Healthcare Industry<\/b><\/h2>\n<p>Failure to address cybersecurity Singapore in the healthcare industry exposes numerous individuals and organizations to various liability and security risks.\u00a0<b><\/b><\/p>\n<h2><b>12. Machine Learning<\/b><\/h2>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24165 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning.jpg?resize=696%2C392&#038;ssl=1\" alt=\"machine learning (AI)\" width=\"696\" height=\"392\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning-scaled.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning-scaled.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning-scaled.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning-scaled.jpg?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning-scaled.jpg?resize=2048%2C1152&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning-scaled.jpg?resize=696%2C391&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning-scaled.jpg?resize=1068%2C601&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning-scaled.jpg?resize=203%2C114&amp;ssl=1 203w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning-scaled.jpg?resize=747%2C420&amp;ssl=1 747w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/machine-learning-scaled.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>Using <a href=\"https:\/\/www.exabytes.sg\/blog\/move-to-cloud-technology-manufacturing-trends\/\" target=\"_blank\" rel=\"noopener\">machine learning<\/a>, cybersecurity systems can assess cybersecurity threat trends and understand the habits of hackers and prevent similar cybersecurity threats in the future.<b><\/b><\/p>\n<h2><b>13. GDPR Observance<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The GDPR, or General Data Protection Law, is one of the most significant advancements in data privacy regulation in European Union (EU) member states.<\/span><b><\/b><\/p>\n<h2><b>14. Higher education cybersecurity threats<\/b><\/h2>\n<p>Cybersecurity threats<span style=\"font-weight: 400;\"> are currently one of the main <\/span>cyber security issues in Singapore<span style=\"font-weight: 400;\"> for individuals in higher education and typically include compromised student data.<\/span><b><\/b><\/p>\n<h2><strong>15. IoT Vulnerability<\/strong><\/h2>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24166 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/internet-of-things-iot.jpg?resize=696%2C417&#038;ssl=1\" alt=\"internet of things (IoT)\" width=\"696\" height=\"417\" \/><\/p>\n<p>Most <a href=\"https:\/\/www.exabytes.sg\/blog\/move-to-cloud-technology-manufacturing-trends\/\" target=\"_blank\" rel=\"noopener\">IoT devices<\/a> are plagued by security vulnerabilities. Computing equipment installed in IoT items enables data transmission and reception via the Internet.<\/p>\n<p>This raises substantial <a href=\"https:\/\/www.exabytes.sg\/cyber-security\" target=\"_blank\" rel=\"noopener\">cybersecurity Singapore <\/a>risks to consumers, exposing them to assaults such as denial-of-service (DoS) or hijacked devices.<b><\/b><\/p>\n<h2><b>16. Cyberattacks on Financial Services<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Another business that faces <\/span>cybersecurity threats<span style=\"font-weight: 400;\"> on a regular basis is the financial services sector. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">It doesn&#8217;t help matters that certain financial institutions are still trying to keep up with cloud migration and the growing number of rules.<\/span><b><\/b><\/p>\n<h2><b>17. Password Exploitation<\/b><\/h2>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24164 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords.jpg?resize=696%2C461&#038;ssl=1\" alt=\"private information passwords\" width=\"696\" height=\"461\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords-scaled.jpg?resize=1024%2C678&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords-scaled.jpg?resize=300%2C199&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords-scaled.jpg?resize=768%2C509&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords-scaled.jpg?resize=1536%2C1017&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords-scaled.jpg?resize=2048%2C1356&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords-scaled.jpg?resize=696%2C461&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords-scaled.jpg?resize=1068%2C707&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords-scaled.jpg?resize=172%2C114&amp;ssl=1 172w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords-scaled.jpg?resize=634%2C420&amp;ssl=1 634w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/login-private-information-passwords-scaled.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">People frequently retain duplicates of their passwords on scraps of paper or sticky notes around or on their workstations. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">An attacker can either find the password on their own or bribe someone on the inside to do it for them.<\/span><b><\/b><\/p>\n<h2><b>18. SQL Injection Exploit<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The Structured Query Language (SQL) injection <\/span><b>cybersecurity threat<\/b><span style=\"font-weight: 400;\"> is a popular way of exploiting websites that rely on databases to provide their visitors. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Client machines that receive information from servers, and a SQL attack employs a SQL query sent from the client to the server&#8217;s database.<\/span><\/p>\n<h2><b><\/b><b>19. URL Translation &amp; DND Spoofing\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Attackers employ URL interpretation to change and fake certain URL addresses or uses <a href=\"https:\/\/www.exabytes.sg\/blog\/what-is-domain-name-system-dns\/\" target=\"_blank\" rel=\"noopener\">Domain Name System<\/a> (DNS) spoofing in order to get access to the target&#8217;s personal and professional data or even redirect traffic to a bogus site.\u00a0 <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once on the phony site, the victim may submit important information that the hacker may exploit or sell.<\/span><b><\/b><\/p>\n<h2><b>20. Threats from Within<\/b><\/h2>\n<p>The most harmful cybersecurity threat might sometimes be found within an organization.<\/p>\n<p>People who work within a company&#8217;s walls become a specific risk since they generally have access to a range of systems and, in certain circumstances, administrative rights that allow them to make crucial modifications to the system or its security regulations.<\/p>\n<p><span style=\"font-weight: 400;\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"aligncenter wp-image-24000 size-medium\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/acronis-cloud-backup-logo.png?resize=300%2C158&#038;ssl=1\" alt=\"\" width=\"300\" height=\"158\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/acronis-cloud-backup-logo.png?resize=300%2C158&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/acronis-cloud-backup-logo.png?resize=768%2C404&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/acronis-cloud-backup-logo.png?resize=696%2C366&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/acronis-cloud-backup-logo.png?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/acronis-cloud-backup-logo.png?resize=799%2C420&amp;ssl=1 799w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/acronis-cloud-backup-logo.png?w=1024&amp;ssl=1 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/p>\n<p><span style=\"font-weight: 400;\">To secure the business from <\/span>cybersecurity threats<span style=\"font-weight: 400;\">, and protect their data, tools like <\/span><a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\"><b>Acronis Cyber Protect<\/b><\/a><span style=\"font-weight: 400;\"> work really well given its wide range of features.<\/span><\/p>\n<p>To know more about cybersecurity threats protection and how Acronis Cyber Protect helps, contact an Exabytes professional via <a href=\"https:\/\/www.exabytes.sg\/\">email<\/a> or <a href=\"https:\/\/api.whatsapp.com\/send?phone=6567272279\" rel=\"noopener\">WhatsApp<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Exabytes Cyber Security Solution<\/strong><\/h3>\n<p>Don&#8217;t let cyber threats disrupt your business! Exabytes&#8217; Cyber Security Solutions offer robust protection for your digital assets. From malware defense to data breach prevention, we&#8217;ve got you covered. Take the first step towards a safer digital environment. Act now! <a href=\"https:\/\/www.exabytes.sg\/cyber-security\" target=\"_new\" rel=\"noopener\">Click here<\/a>.&#8221;<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.exabytes.sg\/cyber-security\"><span class=\"td_btn td_btn_md td_round_btn\">Our Cyber Security Solution<\/span><\/a><\/p>\n<p>Related articles:<\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/cybersecurity-effective-security-tools\/\" target=\"_blank\" rel=\"noopener\">5 Most Effective Security Tools &#8211; Cybersecurity in Industry 4.0\u00a0<\/a><\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/acronis-cyber-protect-vs-bitdefender\/\" target=\"_blank\" rel=\"noopener\">Acronis Cyber Protect vs. Bitdefender: Which is the Better?<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Statista, during the second quarter of 2022, internet users worldwide experienced approximately 52 million cybersecurity threats. The highest number of data cybersecurity threats were detected in the measured period, with nearly 125 million cases in the fourth quarter of 2020. Hackers have the ability to reveal personal information and potentially stop business activities [&hellip;]<\/p>\n","protected":false},"author":75,"featured_media":24172,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[293],"tags":[532,31,535,540],"class_list":{"0":"post-24161","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-backup","8":"tag-acronis","9":"tag-backup","10":"tag-cyber-protection","11":"tag-cybersecurity"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/top-cyber-security-threats-predictions.jpg?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-6hH","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=24161"}],"version-history":[{"count":6,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24161\/revisions"}],"predecessor-version":[{"id":27391,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24161\/revisions\/27391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/24172"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=24161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=24161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=24161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}