Data Security; the challenge we face today
IT Trends | Security | Security
23/05/2022

Let’s talk about Data Security 

The pandemic gave rise to what could be called a quantic leap in terms of business digitalization.  

E-commerce expansion and primarily remote work adopted by a majority of companies forced them to enhance network services without appropriate infrastructure and security levels.  

The agility in responding to these emergencies and avoiding revenue losses due to factors beyond your control come at a price; companies have become more vulnerable to cyberattacks, which compromise security, confidentiality, and integrity of stored data. 

To give you an idea, one out of four Brazilian companies were hit by cyberattacks in the past 12 months. And two types are becoming more popular among them; Ransomware and DDoS attacks.  And they are certainly positioned to continue as the largest cyberattacks in 2022, primarily for telcos, since this sector was a top target last year. 

In general, ransomware attacks use cryptography as the main source to disrupt customer operations, causing invaluable damages.  Cybercriminals use these attacks to extort their victims, who must pay a ransom in order to retrieve access to their data and systems, as it has been clearly reported by the media.  

In the other attack type, i.e., DDoS, accesses are flooded with unwanted traffic, preventing customers and employees from appropriate access to their services.  RansomDDoS (RDDoS) are currently a profitable modality where ransom is collected to interrupt an attack. 

How to assure Data Security

To protect themselves from this new scenario, companies need to invest in Connected Security, this resource enables threat mitigation through a continuous monitoring cycle, which includes the following steps: 

Foresee –> Machine Learning platforms are able to analyze attack behavior, as they perform system defense. Thus, they can anticipate when the next attacks will take place to mitigate them before they become a real threat.  Prevention, primarily Ransomware goes beyond technical matters, involving awareness and ongoing training of employees as well, to prevent access doors for social engineering activities. 

Detect –> DDoS attack detection is given by continuous monitoring, and it happens when traffic and network access requests that may change behaviors and legitimate traffic volumes are analyzed. For Ransomware attacks there is continuous network monitoring correlating systems alerts, applications, and security infrastructure. This allows Incident Response Teams’ reaction, providing tool support to limit lateral movement, scaling privileges, and ultimately encryption, the last borders for the protection of data and applications. 

Prevent –> To increase your systems protection network a robust infrastructure -capable to avoid a higher number of incidents per cyberattack- is required.  The prevention chain must encompass all access means, from user to public or private network infrastructure to Data Center or Cloud. 

Respond –> Time is the second biggest risk in an incident response.   Response to an invasion must be quick, using monitoring and detection systems resources, as mentioned above.  An in-depth incident analysis in tandem with external factors correlation, threat control centers information, and global alerts, in addition to knowledge basis are key for a successful attack containment.  Having solid documentation in place and deep infrastructure knowledge is another success factor. 

Data must be protected 

Even though many companies are still getting used to cope with the challenges of the so called 4th Industrial Revolution, investing and assuring security of their data is no longer a matter of avoiding financial losses, which by the way can be calculated here before they happen. 

We emphasize by saying that with the General Data Protection Regulation (GDPR) in force, protecting that information becomes a matter of survival in legal terms. Therefore, when it comes to infrastructure do not be afraid to invest to protect your data and your customers’. Long-term benefits and peace of mind for your company are always worth the cost and effort. 

Walter Rodrigues
Cybersecurity & SD-WAN Sales Specialist,
Lumen Brazil

Expert in new cybersecurity businesses and SD-WAN, with more than 30 years in the IT and Telecommunications sector.

Share

Recent Posts

IA

AI Revolution: Overcoming Moravec’s Paradox

by | Mar 10, 2025 | UC&C | 0 Comments

AI Revolution: Overcoming Moravec’s Paradox     Moravec’s paradox, articulated by Austrian scientist Hans Moravec, describes an artificial intelligence (AI)...

The SASE Revolution in the Digital Age

by | Mar 7, 2025 | IT Trends | 0 Comments

Importance of SASE in the Digital Age SASE Revolution: The digital culture is here to stay and is constantly evolving. Companies that want to remain competitive are...

What is “dark fiber” and why is its use expanding in Latin American companies?

by | Mar 6, 2025 | Connectivity | 0 Comments

What is "dark fiber" and why is its use expanding in Latin American companies? Secure networks, better use of infrastructure and a high response to critical scenarios...

Beyond generation: why energy efficiency is key to the future

by | Mar 5, 2025 | Data Center & Hybrid Cloud | 0 Comments

Beyond generation: why energy efficiency is key to the future     Every March 5, the world commemorates World Energy Efficiency Day, a key date to reflect on how...

AI and Data Centers: The Infrastructure Challenge in an Industry on the Move

by | Feb 19, 2025 | Data Center & Hybrid Cloud | 0 Comments

AI and Data Centers: The Infrastructure Challenge in an Industry on the Move   The emergence of DeepSeek has shaken the technological world and generated a great...

Forecast and Insights on how AI will reshape CX (Part 2)

by | Feb 11, 2025 | UC&C | 0 Comments

Forecast and Insights on how AI will reshape CX (Part 2)     We mentioned in Part 1 of this article that Customer Experience World has continued evolving to a breakneck...

The Digital Future in 2025: Key Trends That Will Redefine Global Technology Infrastructure

by | Feb 4, 2025 | IT Trends | 0 Comments

The Digital Future in 2025: Key Trends That Will Redefine Global Technology Infrastructure Digital transformation is revolutionizing the global technology landscape,...

Forecast and Insights on how AI will reshape CX (Part 1)

by | Jan 20, 2025 | UC&C | 0 Comments

Forecast and Insights on how AI will reshape CX (Part 1)     The Customer Experience world has continued evolving at breakneck speed in 2024, and there are no...

Asistente de IA

Artificial Intelligence: Strategic partner for business security in Christmas Season

by | Dec 10, 2024 | Security | 0 Comments

Artificial Intelligence: Strategic partner for business security in Christmas Season     The December Holidays -Christmas and New Year's Eve- bring an...

2024 governed by AI: Will the infrastructure move forward consolidation in 2025?

by | Dec 9, 2024 | IT Trends | 0 Comments

2024 governed by AI: Will the infrastructure move forward consolidation in 2025?       2024 will be remembered as the year of the telecommunications...