Cibersecurity: thinking ahead is key
Security
08/06/2022

Cibersecurity: thinking ahead is key

Gartner estimates that investment in information security and risk management will reach USD 172 billion worldwide in 2022, up from USD 115 billion in 2021. Security expert provides additional details and advice for avoiding attacks. 

Both the pandemic and the war between Russia and Ucrania have brought new challenges to the world, including demands for more controls, monitoring, and prevention.   Even the scarcity of material, such as microchips, has created the need to look for ways to reuse what you already have or send things to the cloud, which means that these will also need protection.  

Pablo Dubois, Regional Security Product Manager for Lumen Technologies in Latin America, believes that as cyberattacks become more commonplace and sophisticated, companies need comprehensive security solutions to protect their critical data and applications.  

Additionally, the executive raises some topics that require further attention:

  • Training of personnel responsible for managing the company’s or customers’ sensitive data.
  • Thinking ahead, companies must do more than simply detect and prevent malicious activity; they must consider that they have already been attacked and need to anticipate the response to this situation.

That way, companies will focus on dealing with an increasingly complex framework for action.  According to an Interpol[1] report, due to the pandemic, malicious email traffic has increased by 30% worldwide, which equates to more than 1.5 million emails per day.

In a recent report by Accenture[2], we note that there has been an increase in cyberattacks in 2021, with an average of 270 attacks per company throughout the year (unauthorized access to data, applications, services, networks, or devices), representing a 31% increase over 2020. 

Lumen’s expert says that as cybernetic threats become more common and harder to detect, organizations need more immediate and proactive comprehensive security solutions to protect their critical business data and applications.  

Dubois noted that the most common threat is malware, or malicious software, which is installed in the system causing changes to equipment, blocking network access, and enabling appropriation of personal information.  An example is Phishing, or identity theft, which seeks to steal sensitive data, usually through emails. 

The executive adds to the list interception attacks such as Man-in-the-Middle (MitM), also known as eavesdropping, usually carried out by criminals using a public or insecure WiFi network to secretly access and control devices and steal or capture confidential information.   

It is also important to consider denial of service attacks (DDoS), i.e., attacks that are capable of breaching multiple devices and damaging the company’s system by saturating the network to prevent it from concluding processes and requests.  Lumen’s latest 1Q22 DDoS report shows that of the 500 largest attacks in the first quarter, 97% targeted the Telecom, Gaming, Software and Technology, Hosting, and Government verticals. 

In all cases, says Dubois, companies are vulnerable to cybercriminals who demand ransoms ranging from a few dollars to thousands or millions of dollars to let them recover their information.

For Lumen Technologies’ Regional Security Product Manager for Latin America, IT security is still a pending issue that requires the creation and development of a smart and automated ecosystem to respond to threats immediately, seeking to maintain and ensure operational continuity.  

Dubois emphasizes that we need to be continuously alert and one step ahead in terms of cybersecurity measures.   

[1]https://www.interpol.int/es/Noticias-y-acontecimientos/Noticias/2020/Un-informe-de-INTERPOL-muestra-un-aumento-alarmante-de-los-ciberataques-durante-la-epidemia-de-COVID-19
[2] https://www.accenture.com/_acnmedia/PDF-171/Accenture-State-Of-Cybersecurity-2021-V1901.pdf#zoom=40

 

Pablo Dubois

Author
Pablo Dubois
Regional Security Product Manager
Lumen LATAM

Share

Recent Posts

Guide to understanding WiFi 7 and how it can facilitate computer security improvement

by | Jul 23, 2024 | Connectivity | 0 Comments

  Technology WiFi 7: The seventh generation technology could broadly outperform their previous versions in terms of capacity, connection speeds and latency Cirion...

Technological Innovation in Data Centers: Where are we and where are we heading?

by | Jul 18, 2024 | Data Center & Hybrid Cloud | 0 Comments

  Data Center Technological Evolution is one of the drivers behind the digital transformation of the last decade. From the boom of big data to the ubiquity of...

Transformación Digital

Leading Digital Transformation in Latin America with Substantial Investments

by | Jul 4, 2024 | IT Trends | 0 Comments

    Investments, Expansions and Strategic Alliances   Since the end of 2022, when Cirion Technologies became an independent company, with the support of...

ASN Tier 1

What are ASNs? Learn their importance for Internet quality

by | Jul 2, 2024 | Connectivity | 0 Comments

End users’ experience connecting to the Internet depends on the Autonomous System to which their service provider is connected. According to a topological, data-based...

CDN

The Essential Role of CDNs for Live Sporting Event Broadcasting

by | Jun 27, 2024 | Connectivity | 0 Comments

CDNs ensure high-quality, seamless streaming for large-scale sporting events such as the 2024 Copa América, and the 2024 Paris Olympic Games, efficiently managing...

Internet Wi-Fi 7

Why is Wi-Fi 7 going to transform the way we work and live?

by | Jun 10, 2024 | Connectivity | 0 Comments

The new generation of wireless networks leverages Internet connection, opening endless innovation opportunities, which will change the way organizations create value...

en el sector retail

10 Recommendations to Stop Cyberthreats in the Retail Sector

by | Jun 6, 2024 | Security | 0 Comments

Given the rise of ecommerce, retail companies need to strengthen their cybersecurity policies. Ricardo Pulgarín, cybersecurity expert at Cirion Technologies, shares...

Claves de la Ciberseguridad

Cybersecurity: Keys to “close the doors” on Attackers

by | May 21, 2024 | Security | 0 Comments

The focus on network visibility, application availability, data center resilience, people training, and continuous cybersecurity monitoring are fundamental strategies...

Asistente de IA

A guide to getting started with your AI Companion assistant

by | May 16, 2024 | UC&C | 0 Comments

  In today's fast-paced work environment, maximizing productivity and improving collaboration are top priorities. Fortunately, AI technology can help with that,...

Connecting Latitudes: Moving Towards a Secure and Efficient Digital Future in Latin America

by | May 15, 2024 | Connectivity | 0 Comments

  May 17 is World Telecommunication and Information Society Day, a propitious time to reflect on the advances and perspectives of this critical area in our lives....