How companies can protect themselves day by day from existing cyber threats | Digital medium The Northern Fox

Faced with the various computer dangers that companies and people must overcome daily – such as the recent fraudulent email that offered an additional dose of the coronavirus vaccine or the attack that Mercado Libre suffered a few weeks ago – since the signing AVANTICspecialist and partner in cybersecurity, called to be vigilant against this type of actions that pursue, among other objectives, steal information, carry out scams or demand monetary rewards.

This is stated by Francisco Fernández, general manager of AVANTIC, who adds that this upward trend has occurred as a result of the penetration of the Internet, the increase in digitization, the practice of teleworking and the growing value of information as a strategic asset. .

“According to figures from our partner Fortinet, attacks on end users in Latin America grew by 600% in 2021 compared to 2020. This translated into more than 285,000 million cyber threats,” explains the executive.

Additionally, he maintains that in the future these figures will grow much more, given the expansion of technologies, the advance of digital transformation and the fact that computer criminals see in this type of action an easy way to generate money quickly.

Most common threats

Under this prism, Fernández mentions Phishing and Malware as the dangers that are most repeated today. The first consists of sending a message or email supposedly from a recognized institution (such as a bank, department store, etc.) which, through a link that comes within it and must be activated, redirects the user to a site false website, where the victim is asked to enter their personal data to update the system. In this way, a person’s credentials are stolen.

Malware, meanwhile, is a concept that involves viruses, ransomware, and spyware, among others. “Malware is a malicious program that can be hosted within the web that is visited or in some links that the user accesses and that, when clicked, can generate the download of a virus, Trojan, ransomware or spyware”.

Within this category, ransomware has become more relevant in recent years, since it is a threat that tries to digitally hijack the information of an organization or person, to later demand a ransom in exchange for its release.

Other computer risks are worms, that is, viruses that spread through the Internet and that use the vulnerabilities of operating systems and browsers, and fake antiviruses, which manifest themselves when the user is confronted with a message on the web , where it is announced that your computer has been infected and that you should buy a certain antivirus. Added to these are email chains, which allow cybercriminals to collect an indeterminate number of email addresses to carry out fraudulent actions in the future.

Strategies for greater security

The general manager of AVANTIC shared the following tips to prevent organizations from being victims of these threats:

one. Unify IT security. Under this new look, a company should purchase different products and tools from a single manufacturer. “It consists of a technological infrastructure that can be installed in the client’s offices or in the cloud. Being centralized, it is possible to analyze the entire security environment of an organization with a global vision and control all the problems through a single console, regardless of whether the users are in the company, remotely or teleworking”, affirms Francisco Fernández.

two. Establish a regular backup policy. With this practice, a company ensures that it keeps an updated backup of its relevant information safe in the event of a probable attack or event that endangers or destroys it.

3. Educate employees. The task of raising awareness and raising awareness about computer dangers is one of the main challenges that organizations have today. Hence, it is key to systematically train employees in order to keep them up to date on new cyber threats.

Four. Limit access to confidential information on the corporate network. The privileges that users will have must be established based on their position and responsibilities, within the corporate network. This in order to establish levels or sections of access to the information stored on the servers.

5. Use strong passwords or password managers. Users and collaborators of the company must be required to use passwords that are difficult to decipher and that are made up of letters, numbers and signs. We must not forget that one of the techniques most used by cybercriminals is “brute force”, that is, the one that resorts to the use of algorithms or dictionaries of typical words and passwords to achieve its objective. You can also establish the use of password managers for such purposes.

6. Update software and operating systems. New versions and patches of computer programs and systems that manufacturers make available to users must be installed periodically on equipment and devices. In this way, those vulnerabilities through which cybercriminals can penetrate to commit their crimes will be avoided. Software that is not original should never be used.

7. Restrict internet usage and app downloads in general. Avoid downloading files, programs, and applications from sites with a dubious reputation, since malware and other cyber threats can hide there. The use of the Internet should also be limited, especially since there are many portals that contain web Trojans.

8. Rely on expert advice and support. Organizations, regardless of having internal IT resources, must have external support from companies specializing in cybersecurity and networks.

9. Avoid exposing organization services to the Internet if not necessary. This is because many cases of bad security practices have been recorded, such as exposing remote access through RDP (Remote Desktop Protocol).

We want to give thanks to the author of this write-up for this amazing material

How companies can protect themselves day by day from existing cyber threats | Digital medium The Northern Fox

We have our social media profiles here as well as other pages related to them here.