At least three advanced cyber attacks can overcome security systems and enter the corporate network through desktop programs, emails or servers in the Cloud. These threats can also affect common users and cause financial damage. Experts recommend updating and strengthening digital security measures.
“It is critical for companies that handle highly confidential information. Advanced threats are attacks designed specifically to not be identified by an antivirus and thus overcome the firewall, without problem. They can be of various types, but in general they are focused on violating a system and stealing credentials from one or more clients, ”said Victor Paredes, Microsoft Cloud specialist in Bolivia.
Last week, the technology company released its most recent Security Intelligence Report (SIR), which runs from January to July 2019. 6.5 trillion threat signals were traversed across the Microsoft cloud daily.
Follow the news of eju.tv on Telegram and / or Facebook
“For more than a decade, we have tracked a variety of attacks that include Trojans, worms, exploits, botnets, identity attacks, cloud threats, phishing and much more. As technology changes the attackers rely on new techniques, ”says the SIR.
The report reveals three main cyber threats: malware, ransomware and cryptocurrency mining. To detect them, the detection rate and type of attacks were measured on the devices that use the Microsoft Cloud in Argentina, Brazil, Bolivia, Chile, Colombia, Ecuador, Paraguay, Peru, Uruguay and Venezuela.
The three threats
Malware is a type of hostile software that is intended to damage a device or steal information without the owner's consent.
The report reveals that this year, until July, this threat was detected at a world rate of 3.44%. Although there was a decrease in relation to 2018, when it was 5.07%, in South America it increased to 5.79%, seven points higher than the global average.
The second threat is ransomware. “It is malicious software that, by infecting a device, gives cybercriminals the ability to block it from a remote location and allows it to encrypt files. It takes away from the user the control of the information and the stored data ”. The study explains.
In these cases, through a pop-up window, the cyber criminal usually asks for a ransom for the documents. With the payment in virtual currency.
The Microsoft report found a worldwide rate of 0.03% of this threat. It fell compared to 2018, when it was 0.05%. In Latin America the rate is 0.04%.
The third threat is that which uses infected computers to extract cryptocurrencies (digital currencies). From January to July 2019, the threat was recorded worldwide at 0.05% of the equipment and at the level of South America at 0.18%.
"It is a stealth attack because, because these types of malware work in the background, victims may not know that their computers are infected, until performance degrades," says the study.
But these threats are not only for companies, ordinary users can also be a target of attacks. For them it was recommended to have cyber hygiene, use original software and manage the passwords of the different accounts.
In this situation, Microsoft developed an advanced version of antivirus protection, which covers three types of solutions.
Paredes explained that "Windows Defender ATP, desktop, is so that the company can control advanced attacks directly on the computer." The second solution protects emails and the third one to servers.
“We seek to address all possible gaps where there could be attacks. There are daily threats and every year there is at least one strong attack, ”he said.
Point of view
Fabián Espinoza, cybersecurity specialist
“Reducing the digital divide is a priority for security”
.
Information security is the preservation of your confidentiality, integrity and availability. In addition, other properties such as authenticity, responsibility and reliability may also be involved.
On the other hand, computer security is the set of standards, procedures and tools that focus on the protection of computing infrastructure and everything related to it. It is especially concerned with the information contained in the circulation.
When talking about the latter, four topics must necessarily be considered: prevention, regulation, detection and confrontation.
It is convenient to categorize the possible threats to such "security" from the triad of ransomware, malware and illegal cryptocurrency mining; hardware / software failures and criminal acts of social engineering. This to take necessary measures of prevention, containment and reaction to threats.
The particularity to address this issue at the national level is to recognize the reality of the Bolivian Internet user. The ICT State Survey conducted by the Agency for Electronic Government and Information and Communication Technologies in 2017, indicates that the non-Internet block of the country corresponds to 32.5% of the population. Within this percentage, 51% are from the rural area, 37% are users between 51 and 71 years old; and 53% women. The true national priority is to mitigate the so-called digital divide.
Source: https://www.paginasiete.bo
Source link
https://eju.tv/2019/09/3-tipos-de-ataques-ciberneticos-ponen-en-riesgo-a-las-empresas/