Skip to main content

EVERYONE HAS BECOME PRIME PREY FOR CYBERATTACKS

A few days ago, I read an article by Chekib Gharbi, Director General of CITC (France), published in French in Global Security Mag, on the fact that everyone has become prime prey for cyberattacks*.

He draws our attention to the fact that the next 12 months will be high risk:

“Impacted in nearly 40% of cyberattacks in recent months, SMEs - organizations with fewer than 250 employees - have become prime targets for cyberattackers. Because they do not imagine themselves to be potential victims, believing, wrongly, that the cyber threat is more the business of large groups and others. However, recent reports have shown their fragility, due to lack of adequate information systems.

And these next 12 months will still be at high risk, with major sporting events looming: the Rugby World Cup, the 2024 Olympics. It is crucial for the economic health of companies, whatever their size and activity, but also for the geopolitical stability of countries, to anticipate and know how to react.

Any data is now good to take

Until recently, the targets of cyberattackers were studied: hospitals were targeted because they are structures that do not have the time to negotiate because a computer system at half-mast is harming the health of patients. Major events as well: 4 billion attacks were recorded during the Tokyo Olympics, or 815 reprisals per second. And the stakes are enormous: the disruption of a metro system can damage the reputation of a megacity, the blocking of a ticket office can be a pretext to disrupt the economic activity of a State...

While large organizations have invested to protect themselves at the same time as they were attacked, hackers are now attacking more fragile prey: town halls, small businesses, associations, etc. Structures that are not equipped , and which are not devoid of interest because they require less vigilance from the point of view of hackers, and make it possible to multiply attacks, and thus easily collect data in large numbers.

A need to better “arm” the citizen

 Cyber risk is not just a technical matter. It is not enough to generate lines of code to create impenetrable virtual barriers. Like the COVID-19 vaccine, it was necessary to adopt barrier gestures to protect yourself sustainably from the virus, both in your private and professional sphere. Protecting yourself against the cyber threat is similar: it is necessary to raise public awareness of the danger and learn the right actions…

It is also important to emphasize that cyber risk concerns everyone, not just the IT department.

In view of the state of threats which have a negative impact on the economy and in sectors of daily life, it is urgent to build a real national security project: more investments, more training and more applications to successfully meet the challenges that await us.

PT SYDECO, thanks to its new generation ARCHANGEL© 2.0 firewall, the result of many years of research and continuous development, which integrates a VPN server helps you protect your data, servers and assets against cyber threats.

ARCHANGEL© 2.0, NGFW has proven itself by successfully repelling 2,357,251 attacks in 11 months (https://www.syde.co/products/spone/)!

ARCHANGEL 2.0 protects individuals up to the largest companies and ministries and has a range of products suitable for all business sizes.

 

*(VSEs & SMEs have become prime prey for cyberattackers) https://www.globalsecuritymag.fr/Les-TPE-PME-sont-devenues-des-proies-de-premier-choix-pour-les-cyberattaquants.html

 

#cyberattacks #cybersecurity #VSE #SME #vulnerability #SYDECO #ARCHANGEL #VPN

Comments

Popular posts from this blog

QUIZZ

The 3 first ones who will give the right answers to the 10 following questions will win a Personal Firewall ARCHANGEL© PICCOLO   1.       What is the relation between the 3 background photos that are on the profile page of Mr. Patrick HOUYOUX President-Director of PT SYDECO? 2.        How many devices does the Firewall of Next Generation ARCHANGEL© 2.0 series SA1470 protect and how many secure tunnels does it create? 3.       What is the price of a one-year licence that a user of ARCHANGEL© PICCOLO will have to pay to continue protecting his or her IT installations from the second year onwards? 4.       What are the three programs which are housed in a single server that enable PT SYDECO's Integrated Protection System, to protect data at all times? 5.       Can PICCOLO protect a Smartphone? 6.       When (D/M/Y) did PT SYDECO signed a MOU with the Faculty of Engineering of University Gadjah Mada Yogyakarta? 7.    What are the three main features that make SydeCloud©, PT SYDECO'

A lesson in cyber safety

In an article published on 19 June 2023 in globalsecuritymag.fr/, Benoit Grunemwald, cybersecurity expert at ESET France, recounts the cyberattack suffered by REDDIT, an American social news aggregation, content rating, and discussion website, in February of the same year, and draws some lessons from it. This article follows the hackers' attempts, last repeated on 16 June, to obtain a ransom of 4.5 million dollars in order to delete the 80 GB of data stolen from the company, to which the company did not respond. The data was not encrypted, so the company did not lose it. However, the same cannot be said for its reputation.  Benoit Grunemwald explains that " It all started with a phishing email to harvest employee account data. All it takes is for a single employee to be trapped for cyber criminals to gain access to internal documents, software code, employee data , etc." He goes on to stress the " need to integrate in-depth security methods and resources, such as zer

IDS – IPS – DPI – FIREWALL

Understanding Key Elements of Cyber Defense Against Attacks  In the realm of network security, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), Deep Packet Inspection (DPI), and Firewalls are vital concepts, each with distinct roles, functions, and purposes. This study delves into these components, their capabilities, and the significance of their integration in a holistic cybersecurity strategy. The landscape of cybersecurity hinges on the interplay of IDS, IPS, DPI, and Firewalls, each addressing different facets of network protection. This study elucidates their core functions, while emphasizing their symbiotic relationship within an efficient defense system. This while keeping in mind that the capabilities that will be described are those that each of the components should ideally have but whose effectiveness actually depends on the functions they are equipped with, the quality with which these functions have been created and the level of excellence with which