Journal logo

Top Security Trends of 2022

Ron Navarreta | Anaheim, California

By Ron NavarretaPublished about a year ago 3 min read

As technology advances so do cybercrime. Security and management experts must come up with ways of dealing with the top trends in order to the ever-increasing digital footprint of modern companies against emerging threats.

Companies across the world are facing constant ransomware attacks from a sophisticated group of cybercriminals. Although these kinds of attacks are not new, the COVID-19 pandemic accelerated the situation. This is probably because of the increased use of the internet for various purposes. Below are the top security trends of 2022:

Attack surface expansion

Enterprise attack surfaces are on the rise. Risks related to the use of IoT, cloud applications, social media, cyber-physical systems, open-source code and many others have exposed organizations to the outside environment. As such, internet security experts must go beyond conventional approaches to protect their systems.

Digital supply chain risk

Cybercriminals have realized that attacks on the digital supply chain can offer them great returns. As loopholes like Log4j continue to spread across the supply chain, it is expected that more threats will come through that.

Experts predict that over 40 percent of organizations around the world will be experiencing their software supply chain by 2025. There’s a need for digital supply chains to seek new mitigation measures to be safe.

Distributing decisions

Enterprise cybersecurity needs are getting more sophisticated. That’s why executives need more agile security considering the ever-expanding stack surface. The scope, complexity, and scale of digitization make it important to distribute cybersecurity decisions, accountability, and responsibility across the board.

Identity threat detection and response

Cybercriminals are becoming more sophisticated every day. They are now targeting identity and access management infrastructure to get into different networks. Most companies have spent a lot of time and resources improving IAM capabilities. But a lot of efforts have been geared toward technology that improves user authentication.

Beyond awareness

Human error plays a major role when as far as data breaches as concerned. This means that conventional methods and techniques for security awareness are obsolete. That’s why most reputable organizations are heavily investing in holistic security solutions.

Cybersecurity consolidation

Security technology convergence is increasing and is being influenced by the desire to minimize complexity, increase effectiveness and minimize administration overhead costs.


Ron Navarreta is a security and crime expert with almost 30 years of experience in the industry. He holds a Bachelor’s degree, as well as a Master’s in Corporate Security Management. Prior to working in the private security industry, Ron spent the majority of his career in law enforcement. As a young boy, he’d always dreamt of a career in the field, as offices and the traditional 9 to 5 never appealed to him.

When his dreams became a reality, Ron relished in the thought that he was a part of something bigger—an entity whose sole purpose is to give people a sense of security. Always a people-person, he loved constantly being around others and the dynamic nature of teamwork. After decades in law enforcement, Ron decided it was time for a change.

In 2015, Ron Navarreta joined the private sector and began his career in private security, working as a consultant, leading security teams, conducting security assessments, and managing client relationships. Ron soon realized that the teamwork component inherent in law enforcement precincts was also present in private sector security, so he found the transition easy.

Ron also found his career transition rewarding. Unfortunately, the current state of the world demands that critical infrastructure, private business, and the people within these institutions must be—and feel—protected. The perceived absence of security can demoralize individuals to the point that it harms productivity. Unplanned time off caused by fear and feelings of being unappreciated can be toxic to operations. Fortunately, a robust corporate security plan can mitigate such a negative impact, which Ron finds immensely rewarding as a security professional.


About the Creator

Ron Navarreta

Ron Navarreta is a security operations specialist in the critical infrastructure space and an ASIS International board-certified security expert (CPP®) with experience law enforcement and private sector safety and security experience.

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments (2)

Sign in to comment
  • PPabout a year ago

    Please read my article.

  • PPabout a year ago


Find us on social media

Miscellaneous links

  • Explore
  • Contact
  • Privacy Policy
  • Terms of Use
  • Support

© 2023 Creatd, Inc. All Rights Reserved.