
Cybercrime, its possible scope and consequences in terms of material and immaterial losses (reputation) it has been installed as never before in the public and media agenda of Argentina. Without going into the details of the most recent cases of computer attacks, I would like to rescue a series of lessons for the future.
The first is that the process of digitalization, which has accelerated for sure since the pandemic, simplified people’s livesbut at the same timethey also made us more vulnerable in front of the cybercriminals.
5 key trends that will define the banking sector in 2023
Understanding this diagnosis is essential both for individuals and for organizations of all kinds, regardless of their size, although it is true that more and more SMEs are showing interest and concern in the matter. Today no one is exempt from suffering a cyber attack. This is something that we have been measuring and quantifying on a global level for a long time.
According to the most recent Microsoft Digital Defense reportSun tanning In the last year alone, password attacks have increased by 74 percent.while those of password spray–what is known in technology as a type of brute force attack in which a criminal tries the same password on multiple accounts before advancing to others and repeating the process- increased by 230 percent during the same period.
What are the main challenges of organizations and how to face them
In this context, the main challenges facing all organizations are the ppossible operational interruption (which translates into a negative economic impact for the private sector), the loss of sensitive intellectual property you damage to reputationnormative or regulatory, of a security incident. These consequences go beyond the merely technological and have become a sensitive issue. which should be evaluated a directory level.
Cybersecurity: the best tips to protect your Twitter account
The good news is that there is a simple way to counter virtually all of these threats. It is about the adoption of a Zero Trust strategy, which allows us to cover ourselves from 98 percent of cyberattacks.
How the strategy that allows covering 98% of attacks works
This approach consists of implementing a series of “hygiene” measures that any organization, public or private, can adopt to be protected and minimize the risks in terms of computer security.
this modelor has as a mantra the phrase “I never trust, I always verify” Y is based on three pillars:
- check Cleanly,
- use the least privilege possible and
- We assume we’ve already been compromised.
Thus, We consider that any access attempt comes from an insecure place until proven otherwise.
As a benchmark in computer security, I have seen the evolution of cybercrime for years and I believe that today more than ever we must continue to redouble our efforts in terms of awareness so that more and more people and organizations can adopt the necessary measures to prevent and reduce risks. from cyberattacks, and thus achieve a simple and secure environment for business development and many other activities.
* Director of Microsoft Cybersecurity for Latin America.
You may also like

