{"id":27118,"date":"2022-01-12T16:20:00","date_gmt":"2022-01-12T15:20:00","guid":{"rendered":"https:\/\/perseus.de\/using-cybersecurity-learnings-from-2021-for-2022\/"},"modified":"2026-03-30T15:08:22","modified_gmt":"2026-03-30T13:08:22","slug":"using-cybersecurity-learnings-from-2021-for-2022","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/","title":{"rendered":"Using cybersecurity learnings from 2021 for 2022"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27118\" class=\"elementor elementor-27118 elementor-22583\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"339\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2022\/01\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27117\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2022\/01\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg 600w, https:\/\/perseus.de\/wp-content\/uploads\/2022\/01\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1-300x170.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image source: chenspec via pixabay<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-578302f2 e-flex e-con-boxed e-con e-parent\" data-id=\"578302f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b17fd53 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"3b17fd53\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"991427923\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-9914279231\" data-tab-title-id=\"e-n-tab-title-9914279231\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-9914279231\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tGerman\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-9914279232\" data-tab-title-id=\"e-n-tab-title-9914279232\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-9914279232\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tEnglish\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-9914279231\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-9914279231\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-2b69dec8 e-con-full e-flex e-con e-child\" data-id=\"2b69dec8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-28403b17 e-flex e-con-boxed e-con e-child\" data-id=\"28403b17\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-050476e e-con-full e-flex e-con e-child\" data-id=\"050476e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f08b530 e-con-full e-flex e-con e-child\" data-id=\"f08b530\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b304c48 elementor-widget elementor-widget-text-editor\" data-id=\"b304c48\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>12.01.2022<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc44e71 elementor-widget elementor-widget-heading\" data-id=\"cc44e71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Using cybersecurity learnings from 2021 for 2022\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48ae0a6 elementor-widget elementor-widget-text-editor\" data-id=\"48ae0a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | IT Protection | Tips and trends<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c1c7ec8 e-con-full e-flex e-con e-child\" data-id=\"c1c7ec8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac04524 elementor-widget elementor-widget-text-editor\" data-id=\"ac04524\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>2021 has been a turbulent year \u2013 also when it comes to cybersecurity. What can we learn from the events for 2022? We reveal that in this blog article.  <\/strong><\/p><p> <\/p><p><strong>1. Unfortunately, Emotet has not yet been defeated.<\/strong><\/p><p>At the beginning of 2021, the good news was that the infrastructure of the macro virus Trojan Emotet has been destroyed. By that time, the world&#8217;s most dangerous malware had already cost millions of dollars. Worldwide, the damage caused by Emotet is even estimated at 2.1 billion euros.  <\/p><p>Emotet&#8217;s distinguishing mark was deceptively real-looking emails, most of which contained malicious software in an attachment. Once installed, Emotet was able to load further malware onto the infected computers.<br>Unfortunately, the break-up of Emotet was not final. Since the end of 2021, Emotet activities have been observed again, including the sending of fake emails. As before, Emotet partly quotes real previous emails. The highest level of vigilance is therefore again required for all e-mails that contain Office documents with active content (macros), password-protected ZIP archives or links.    <\/p><p>Learning: The critical handling of e-mails and their content as well as attachments remains extremely important. Emotet makes it particularly difficult to detect fake emails, so the highest level of attention is required. <\/p><p>Additional tips: In this danger warning for Emotet, you can learn more about the malware and what you should look out for.<br>As a macro virus Trojan, Emotet is often distributed via Office documents. Here you will find important information on the prudent handling of such documents. <\/p><p><strong>2. Even the smallest company is interesting for cybercriminals.<\/strong><\/p><p>In 2021, several security vulnerabilities were disclosed that affected companies of all sizes worldwide. On the one hand, it was about critical vulnerabilities in the frequently used Microsoft Exchange servers. On the other hand, security vulnerabilities were discovered in the Java library Log4j. This is a component of many programs and is therefore widely used. Cybercriminals can exploit these vulnerabilities very easily. They search the Internet specifically for corresponding servers and computers. For example, to steal data, install ransomware or engage in cryptojacking.<br>Even the smallest companies were and are interesting for such attacks. Because they also have criminally usable data. They are also dependent on functioning IT, so that ransoms may be extorted. And they also have computer resources that can be misused to mine cryptocurrencies.<br>In general, the easier it is to carry out attacks, the more vulnerable small companies are, where there is supposedly &#8220;nothing to gain&#8221;. This is because many successful small attacks mean considerable profits for the cybercriminals in total.          <\/p><p>Learning: Be meticulous about keeping your entire system up to date \u2013 no matter how small your business is. Install all patches and updates immediately. Since many different programs use Log4j, every single update can be decisive. If you are using Microsoft Exchange servers, check them separately.   <\/p><p>Additional tip: Our blog post &#8220;Hacked \u2013 what now?&#8221; will help you to keep the damage to your system as low as possible in the event of attacks on your system.<\/p><p><strong>3. After a ransomware ransom payment, all data is rarely restored.  <\/strong><\/p><p>A large, international survey showed what Perseus had previously experienced: Unfortunately, ransom payments are no guarantee that blackmailed companies will get their data back in full. <a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/pdfs\/whitepaper\/sophos-state-of-ransomware-2021-wp.pdf\">On the contrary, this was the case for only 8%.<\/a> Why? Among other things, because there is no decryption program for some ransomware at all. For others, decryption does not work or does not work completely due to software bugs.   <\/p><p>In our opinion, all companies need to be aware of this fact \u2013 especially in view of the often exorbitantly high ransom sums. For example, last year, after the cyberattack on MediaMarktSaturn, a ransom of $240 million was demanded, which was reportedly negotiated down to $50 million. It is unknown whether MediaMarktSaturn paid. But even a week after the attack, there was still no normal operation in the stores.   <\/p><p>Learning: Rely on up-to-date backups to be able to fully restore your data even in the event of a ransomware attack. Always keep at least one backup physically separate from your system so that it is not also encrypted in the event of an attack. <\/p><p>Additional tip: Make several backups according to the 3-2-1 strategy.<\/p><p><strong>4. Even excellently secured clouds are not infallible.<\/strong><\/p><p>Reputable cloud services offer very high security standards. The fact that, despite all the meticulousness and expertise, failures can also occur here was shown at the beginning of November in the DATEV data center. For two consecutive days, there were server outages and errors in document processing.<br>The cause was not \u2013 as initially suspected by many \u2013 an attack, but two unfortunate <a href=\"https:\/\/www.datev-community.de\/t5\/Technisches-zu-Software\/Behoben-St%C3%B6rungen-im-DATEV-Rechenzentrum-08-10-11-2021\/m-p\/250468#_=_\">software errors<\/a>. Its effects also made it difficult to communicate the disorder widely.   <\/p><p>Learning: There is no such thing as 100% reliability, not even with justifiably very renowned services. Therefore, even if you have high expectations of a service, think about how you could best react to a short-term outage. <\/p><p>Additional tip: Reduce potential cyber incidents by using your cloud in a security-conscious way.<\/p><p><strong>5. Smartphones are also interesting for cybercriminals.<\/strong><\/p><p>For technical reasons, smartphones are a challenge for cybercriminals. In 2021, however, a particularly large number of users came into contact with compromise attempts \u2013 in the form of SMS.<br>The messages often came from a supposed parcel delivery service and asked to download an app. Supposedly to track a shipment. But this app was malware, including banking Trojans such as TeaBot.   <\/p><p>Cybercriminals can use such malware apps to live stream the screen of a smartphone, record inputs and start SMS messages \u2013 for example, in online banking. However, cybercriminals cannot remotely install these apps on a smartphone. Therefore, they try to get users to do so, e.g. by SMS.  <\/p><p>Learning: If possible, only install apps from official sources, i.e. from the official app stores or directly from the provider. Ignore corresponding links in SMS and always consciously take the detour via the App Store or the provider. <\/p><p>Additional tip: For detailed information on cybercriminals&#8217; strategies and how to protect yourself from them, check out our blog post on smishing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-9914279232\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-9914279232\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\" elementor-element elementor-element-699d7011 e-con-full e-flex e-con e-child\" data-id=\"699d7011\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-58dfa25 e-flex e-con-boxed e-con e-child\" data-id=\"58dfa25\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cbf4049 e-con-full e-flex e-con e-child\" data-id=\"cbf4049\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c53195 elementor-widget elementor-widget-text-editor\" data-id=\"3c53195\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>12.01.2022<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1da8a3d elementor-widget elementor-widget-heading\" data-id=\"1da8a3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Leveraging cybersecurity lessons learned in 2021 for 2022<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d23491e elementor-widget elementor-widget-text-editor\" data-id=\"d23491e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cyber security | IT protection | Tips and trends<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3dd38be e-con-full e-flex e-con e-child\" data-id=\"3dd38be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8b0ec6c elementor-widget elementor-widget-text-editor\" data-id=\"8b0ec6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>With 2021 behind us, we can look back on a turbulent year \u2013 also in terms of cybersecurity. What lessons can we learn from the events of 2021 for 2022? We reveal all in this blog article.  <\/strong><\/p><p> <\/p><p><strong>1. Emotet has unfortunately not yet been defeated.<\/strong><\/p><p>At the beginning of 2021, the good news was that the infrastructure of the Emotet macro virus Trojan had been destroyed. By that point, the world&#8217;s most dangerous malware had already caused millions in damage. Worldwide, the damage caused by Emotet is estimated at 2.1 billion euros.  <\/p><p>Emotet&#8217;s hallmark was deceptively genuine-looking emails, most of which contained malicious software in an attachment. Once installed, Emotet was able to download further malware onto the infected computers. <\/p><p>Unfortunately, however, Emotet was not completely destroyed. Since the end of 2021, Emotet activity has been observed again, including the sending of fake emails. As before, Emotet sometimes quotes genuine previous emails. The highest level of vigilance is therefore once again required for all emails containing Office documents with active content (macros), password-protected ZIP archives or links.   <\/p><p> <\/p><p><strong>Learnings<\/strong>: It remains extremely important to treat emails and their contents and attachments with caution. Emotet makes it particularly difficult to detect fake emails, so the highest level of vigilance is required. <\/p><p>Additional tips: In this Emotet threat alert, you can find out more about the malware and what you should look out for.<\/p><p>As a macro virus Trojan, Emotet is often spread via Office documents. Here you will find important information on how to handle such documents with caution. <\/p><p> <\/p><p><strong>2. Even the smallest companies are of interest to cybercriminals.<\/strong><\/p><p>In 2021, several security vulnerabilities were discovered that affected companies of all sizes worldwide. These included critical vulnerabilities in the widely used Microsoft Exchange servers. Security vulnerabilities were also discovered in the Java library Log4j. This is a component of many programmes and is therefore widely used. Cybercriminals can exploit these security vulnerabilities very easily. They search the internet specifically for relevant servers and computers. For example, to steal data, install ransomware or engage in cryptojacking.      <\/p><p>Even the smallest companies were and still are attractive targets for such attacks. This is because they too have data that can be exploited by criminals. They are also dependent on functioning IT systems, which means that ransom money can potentially be extorted from them. And they also have computing resources that can be misused for mining cryptocurrencies.   <\/p><p>As a general rule, the easier attacks are to carry out, the more vulnerable small businesses are, even if they appear to have &#8216;nothing to steal&#8217;. This is because many successful small attacks add up to considerable profits for cybercriminals. <\/p><p> <\/p><p><strong>Learnings<\/strong>: Make sure that your entire system is always up to date, no matter how small your business is.<\/p><p>Install all patches and updates immediately. Since many different programmes use Log4j, every single update can be crucial. If you use Microsoft Exchange servers, check them separately.  <\/p><p>Additional tip: Our blog post &#8216;Hacked \u2013 what now?&#8217; will help you minimise the damage caused by attacks on your system.<\/p><p> <\/p><p><strong>3. After paying a ransomware ransom, all data is rarely restored.<\/strong><\/p><p>A large international survey confirmed what Perseus already knew from experience: unfortunately, paying ransoms does not guarantee that blackmailed companies will get all their data back. <a href=\"https:\/\/secure2.sophos.com\/en-us\/medialibrary\/pdfs\/whitepaper\/sophos-state-of-ransomware-2021-wp.pdf\">On the contrary, this was only the case in 8% of cases<\/a>. Why? Among other things, because no decryption program exists for some ransomware. In other cases, decryption does not work or does not work completely due to software errors.   <\/p><p>In our opinion, all companies need to be aware of this fact \u2013 especially given the often exorbitantly high ransom demands. For example, last year, after the cyberattack on MediaMarktSaturn, a ransom of $240 million was demanded, which according to reports was negotiated down to $50 million. It is not known whether MediaMarktSaturn paid. But even a week after the attack, normal operations had not yet resumed in the stores.   <\/p><p> <\/p><p><strong>Learnings<\/strong>: Rely on up-to-date backups so that you can completely restore your data even in the event of a ransomware attack. Always keep at least one backup physically separate from your system so that it is not also encrypted in the event of an attack. <\/p><p>Additional tip: Make multiple backups using the 3-2-1 strategy.<\/p><p> <\/p><p><strong>4. Even excellently secured clouds are not infallible.<\/strong><\/p><p>Reputable cloud services offer very high security standards. However, despite all the meticulousness and expertise involved, failures can still occur, as was demonstrated at the DATEV data centre in early November. On two consecutive days, there were server failures and errors in document processing.  <\/p><p>Contrary to initial assumptions, the cause was not an attack, but two unfortunate coinciding <a href=\"https:\/\/www.datev-community.de\/t5\/Technisches-zu-Software\/Behoben-St%C3%B6rungen-im-DATEV-Rechenzentrum-08-10-11-2021\/m-p\/250468#_=_\">software errors<\/a>. Their effects also made it difficult to communicate the disruption to a wide audience. <\/p><p> <\/p><p><strong>Learnings<\/strong>: There is no such thing as 100% reliability, not even with highly reputable services. Therefore, even if you have high expectations of a service, consider how you could best respond to a short-term outage. <\/p><p>Additional tip: Reduce potential cyber incidents by using your cloud in a security-conscious manner.<\/p><p> <\/p><p><strong>5. Smartphones are also of interest to cybercriminals.<\/strong><\/p><p>For technical reasons, smartphones are a challenge for cybercriminals. However, in 2021, a particularly large number of users came into contact with attempts to compromise their devices \u2013 in the form of text messages. <\/p><p>The messages often came from a supposed parcel delivery service and asked users to download an app. Supposedly to track a shipment. But this app was malware, including banking Trojans such as TeaBot.  <\/p><p>Cybercriminals can use such malware apps to live stream a smartphone screen, record keystrokes and send text messages \u2013 for example, when online banking. However, cybercriminals cannot install these apps remotely on a smartphone. They therefore try to persuade users to do so themselves, e.g. via text message.  <\/p><p> <\/p><p><strong>Learnings<\/strong>: Only install apps from official sources, i.e. from official app stores or directly from the provider. Ignore any links in text messages and always take the detour via the app store or the provider. <\/p><p>Additional tip: You can find detailed information about cybercriminals&#8217; strategies and how to protect yourself against them in our blog post on smishing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>2021 has been a turbulent year \u2013 also when it comes to cybersecurity. What can we learn from the events for 2022? We reveal that in this blog article.  <\/p>\n","protected":false},"author":3,"featured_media":27117,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Using cybersecurity learnings from 2021 for 2022 - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Using cybersecurity learnings from 2021 for 2022 - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"2021 has been a turbulent year \u2013 also when it comes to cybersecurity. What can we learn from the events for 2022? We reveal that in this blog article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-12T15:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T13:08:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2022\/01\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"339\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Using cybersecurity learnings from 2021 for 2022\",\"datePublished\":\"2022-01-12T15:20:00+00:00\",\"dateModified\":\"2026-03-30T13:08:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/\"},\"wordCount\":4072,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/\",\"name\":\"Using cybersecurity learnings from 2021 for 2022 - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg\",\"datePublished\":\"2022-01-12T15:20:00+00:00\",\"dateModified\":\"2026-03-30T13:08:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg\",\"width\":600,\"height\":339},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/using-cybersecurity-learnings-from-2021-for-2022\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using cybersecurity learnings from 2021 for 2022\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Using cybersecurity learnings from 2021 for 2022 - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/","og_locale":"en_US","og_type":"article","og_title":"Using cybersecurity learnings from 2021 for 2022 - Perseus Technologies","og_description":"2021 has been a turbulent year \u2013 also when it comes to cybersecurity. What can we learn from the events for 2022? We reveal that in this blog article.","og_url":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/","og_site_name":"Perseus Technologies","article_published_time":"2022-01-12T15:20:00+00:00","article_modified_time":"2026-03-30T13:08:22+00:00","og_image":[{"width":600,"height":339,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2022\/01\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Using cybersecurity learnings from 2021 for 2022","datePublished":"2022-01-12T15:20:00+00:00","dateModified":"2026-03-30T13:08:22+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/"},"wordCount":4072,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2022\/01\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/","url":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/","name":"Using cybersecurity learnings from 2021 for 2022 - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2022\/01\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg","datePublished":"2022-01-12T15:20:00+00:00","dateModified":"2026-03-30T13:08:22+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2022\/01\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2022\/01\/Blog_Cyber-Learning_via-chenspec-via-pixabay-600x339-1.jpg","width":600,"height":339},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/using-cybersecurity-learnings-from-2021-for-2022\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Using cybersecurity learnings from 2021 for 2022"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27118"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27118\/revisions"}],"predecessor-version":[{"id":27119,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27118\/revisions\/27119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27117"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}