Intelligent Tech Channels LATAM Issue 07 | Page 16

INDUSTRY VIEW

WHAT ARE THE MOST PRESSING CYBER- RISKS THAT CHANNEL PARTNERS SHOULD PREPARE FOR AND HOW CAN THEY BEST MITIGATE THESE THREATS ?

FILIPE GRAHL , CYBERSECURITY SPECIALIST , DFENSE

Today , the main risks are ransomware , poorly configured or outdated systems , credential theft , social engineering , supply chain attacks and ‘ insiders ’.

In the case of ransomware , many companies face the moral and practical dilemma of whether or not to pay the ransom , as data recovery remains uncertain . Additionally , the extortion perpetrated by these cybercriminal conglomerates can branch into different aspects , as evidenced by the BlackCat group , which employs a quadruple extortion – communication with partners , directors and stakeholders ; DDoS attacks ; data encryption ; and threats of public leaks – with the aim of intimidating their victims . From the point of view of preventive strategies , to protect against these threats , there is the establishment of robust backups , intensive employee training and rigorous system maintenance .
On the other hand , vulnerability generated by poor configuration or outdated systems creates an avenue for cybercriminals to act . Illustratively , an improperly configured repository on GitHub uncovered 38 TB of Microsoft data , highlighting the critical importance of intensive and regular patch management and security audits .
As for ‘ Credential Stuffing ’, the exploitation of previously leaked credentials allows illegal access , especially when we consider the common practice of using the same password on multiple platforms . By having knowledge of a user ’ s credentials , an attacker can exploit this information to identify patterns in the passwords used and orchestrate dictionary attacks . These , in turn , use such patterns to perform brute force attacks and potentially compromise a system . Implementing two-factor authentication and encouraging the use of
distinct and robust passwords appears as an essential shield against these attacks .
Furthermore , social engineering and phishing directly target the most vulnerable link : the human being . By manipulating people through fraudulent messages or direct persuasion , criminals aim to gain access to crucial information , making a solid investment in ongoing employee training and awareness imperative .
Supply chain attacks aim to compromise products or services at some point before their delivery to the end consumer . The iconic 2020 SolarWinds case illustrates this type of occurrence , where software was compromised , impacting thousands of customers , including government entities . Security , in this context , must extend beyond the company ’ s boundaries , encompassing the entire supplier network .
Finally , insiders are individuals with privileged access who , motivated by revenge , financial gain , or simple negligence , can cause immense damage . The response to this threat encompasses detailed monitoring of systems , the implementation of clear policies and the promotion of an intrinsic culture of responsibility in the field of cybersecurity , ensuring a safer and more intact digital environment for everyone .
16 www . intelligenttechchannels . com / latam