More than 20,000 cyberattacks this 2021. What to do?

More than 20,000 cyberattacks this 2021. What to do?
Cyber ​​crimes continue their trend: they increased by 35 percent, according to a study carried out by the ICT Analysis and Creativity Tank (TicTac) on the challenges and threats to cybersecurity in the country.
 
The cybersecurity figures as of June of this year are alarming. More than 23,000 criminal news were registered, 30% more than the same period in 2020 that presented 18,290 cases according to the Attorney General's Office.
 
The cities that have reported the greatest impact are Bogotá with 8,355 cases, followed by Medellín with 1,664 and finally Cali with 1,569. Faced with this contingency that the whole world is experiencing, the tools to prevent cyber attacks are at the hand of those who require them.
 
The ICT Analysis and Creativity Tank (TicTac) and its Security Applied to Business Strengthening (SAFE) program launched its study "Evaluation, challenges and threats to cybersecurity" a document that through 6 chapters invite companies to search technological and human resources that help them protect information in the most convenient way.
 
Some of the topics addressed in the document are: the cloud, models to detect gaps and possible cybersecurity threats, cyber-attack trends and the importance of joint work between the Government, companies and citizens.
 
In this regard, Adriana Ceballos, director of program development at TicTac, made reference to the document stating that “we have been analyzing the context we are experiencing and cybersecurity is configured as the cornerstone of data. In this study, in addition to carrying out an evaluation and highlighting the challenges and threats that companies face, we made some recommendations on how cyber attacks could be fought ”.
 
The study also presents in detail the most reported types of cyberattacks, such as the case of the violation of personal data that is in the first place, presenting an increase of 108% with 6,649 complaints filed compared to the 3,191 registered in 2020 .
 
Against this, mass sending of emails through the phishing modality, where they use messages directed to email mailboxes of personal or corporate users with infected links, continues to be the most used strategy to scam or steal information.
 
For Juan Hover González, Information Security Manager at Claro Colombia, “the post-pandemic focus is to provide better ways to proactively identify and address potential vulnerabilities before they can be exploited by attackers.
 
That is why it is necessary to implement multi-factor authentication platforms, review your application flows, consult with security technology manufacturers about endpoint threat detection and response (EDR), and complement with advanced Antimalware. Likewise, have a secure email service and fine-tune your Application Firewall (WAF) that responds immediately to malformed packets or identifiable attack signatures and, finally, carry out permanent security tests ”.
 
The second most used modality, with an increase of 29%, is the spoofing of websites to capture personal data, which precisely has a direct relationship with the previous trend, since this modality operates under malicious links for the dissemination of harmful codes, That may well be presented through phishing, smishing, or pharming and had an increase of 638 cases with 2,825 reported to the Attorney General's Office compared to 2,187 in 2020 in the same period.
 
The third and last modality with the greatest increase during 2021 is abusive access to the computer system with a variation of 806 cases that correspond to a 26% increase compared to the figures reported during 2020 that reached 3,059 cases and those registered during 2021 that 3,865 complaints have already been filed.
 
 
 
RECOMMENDATIONS:
 
1. Implement a solution that allows you to quickly investigate suspicious and highly malicious activity. This is the best way to deal with incidents.
 
2. Evaluate and analyze the needs of your company to be able to adopt a technological tool that is optimal for the business. Remember that there are products that are not the same for everyone.
 
3. Adopt the best cybersecurity practices; Increase the way you validate identity through multiple authentication factors and build compliance policies. This will help establish much more secure security policies defining what types of devices can connect to the network and access your company information.
 
4. Remember that it is not only adopting technology but also making users aware of cybersecurity, since they are the ones who determine the scope of technology and its ability to intervene in daily life.
 

Tell us what your problems are at the web level and schedule an appointment with our experts in web development and cybersecurity. Avoid problems by taking right decisions.