Our website use cookies to improve and personalize your experience and to display advertisements(if any). Our website may also include cookies from third parties like Google Adsense, Google Analytics, Youtube. By using the website, you consent to the use of cookies. We have updated our Privacy Policy. Please click on the button to check our Privacy Policy.

To face cybercrime, you must adopt the “zero trust” strategy

To face cybercrime, you must adopt the “zero trust” strategy

Cybercrime, its possible scope and consequences in terms of material and immaterial losses (reputation) it has been installed as never before in the public and media agenda of Argentina. Without going into the details of the most recent cases of computer attacks, I would like to rescue a series of lessons for the future.

The first is that the process of digitalization, which has accelerated for sure since the pandemic, simplified people’s livesbut at the same timethey also made us more vulnerable in front of the cybercriminals.

5 key trends that will define the banking sector in 2023

Understanding this diagnosis is essential both for individuals and for organizations of all kinds, regardless of their size, although it is true that more and more SMEs are showing interest and concern in the matter. Today no one is exempt from suffering a cyber attack. This is something that we have been measuring and quantifying on a global level for a long time.

According to the most recent Microsoft Digital Defense reportSun tanning In the last year alone, password attacks have increased by 74 percent.while those of password spraywhat is known in technology as a type of brute force attack in which a criminal tries the same password on multiple accounts before advancing to others and repeating the process- increased by 230 percent during the same period.

What are the main challenges of organizations and how to face them

In this context, the main challenges facing all organizations are the ppossible operational interruption (which translates into a negative economic impact for the private sector), the loss of sensitive intellectual property you damage to reputationnormative or regulatory, of a security incident. These consequences go beyond the merely technological and have become a sensitive issue. which should be evaluated a directory level.

Cybersecurity: the best tips to protect your Twitter account

The good news is that there is a simple way to counter virtually all of these threats. It is about the adoption of a Zero Trust strategy, which allows us to cover ourselves from 98 percent of cyberattacks.

How the strategy that allows covering 98% of attacks works

This approach consists of implementing a series of “hygiene” measures that any organization, public or private, can adopt to be protected and minimize the risks in terms of computer security.

this modelor has as a mantra the phrase “I never trust, I always verify” Y is based on three pillars:

  1. check Cleanly,
  2. use the least privilege possible and
  3. We assume we’ve already been compromised.

Thus, We consider that any access attempt comes from an insecure place until proven otherwise.

As a benchmark in computer security, I have seen the evolution of cybercrime for years and I believe that today more than ever we must continue to redouble our efforts in terms of awareness so that more and more people and organizations can adopt the necessary measures to prevent and reduce risks. from cyberattacks, and thus achieve a simple and secure environment for business development and many other activities.

* Director of Microsoft Cybersecurity for Latin America.

You may also like

By Robert Collins

You May Also Like

Orbitz