Home Tags Posts tagged with "ataques cibernéticos"
Tag:

ataques cibernéticos

Noticias | Empresas aumentan inversión de ciberseguridad en Chile

Cybersecurity Companies in Chile

Companies increase cybersecurity investment in Chile

Computer security is increasing every day in chilean companies due to dangers they are facing from constant cyberattacks that put their infrastructure and computer security at risk.

In 2018, different companies in Chile invested a total of 156 million dollars in cybersecurity, which implies a growth of 10% compared to 2017, when the investment budget was less than 145 million dollars, while in 2016 it stood at 125 million dollars.

A recent study indicated that 45% of the companies in Chile consider it opportune and a priority to invest in security and IT technology.

In 2019 cyberattacks intensified by 20% compared to other years, on the other hand, growth in investment by Chilean companies in cybersecurity also grew by 18%, this due to the increase exponential number of attacks on these companies”, commented José Domingo Abogabir, CEO  Managing Director of Measured Security.

The deficit of professionals in the area of ​​computer security reaches up to 90% and many of these companies find it difficult to hire specialists in cybersecurity. Only between 6 and 8% of people are prepared to work in this area.

Another of the biggest challenges Chile faces in terms of cybersecurity issues is that there are not enough educational institutions that offer this career as an attraction to meet the requirements of many companies in this area. Currently, work is being done in educational institutions to create new curricula on computer security, on the other hand, educational spaces are being created where courses and diplomas are offered to guarantee constant learning in professionals.

If your company needs to invest in cybersecurity, do not hesitate to contact us. You can write to us through Whatsapp by clicking on the following image:

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
Noticias | El FORO ECONÓMICO MUNDIAL asegura que este 2020 los ataques cibernéticos se intensificarán

The WORLD ECONOMIC FORUM ensures that in 2020 cyber attacks will intensify

Globally, cyberattacks have increased by almost 76% and it is expected that by 2020 they will intensify even more, this, according to a report from The Global Risks Report 2020 released by the World Economic Forum.

This has not been the first wake-up call made by this prestigious institution, there are already several IT Security Agencies worldwide that are concerned about the risk that an increase in these attacks against companies and individuals implies. According to this study, it would have a negative impact in a period of no more than 10 years.

The investigations about this report had the participation of more than 750 experts on this subject, and for them, cyberattacks against large, medium and small companies will increase by 76%; on the other hand, 75% indicated that this increase is intended to search for data and money.

Consequently, these cybercriminals will take advantage by stealing information from other companies and people, and the industrial sectors that will be most affected would be: the health sector, the energy sector, the transport sector and of course, the technology sector.

What technologies will be affected by cyberattacks?

  • Artificial intelligence: This technology is increasingly used by companies around the world, having its immense participation in the telephone attention systems and also in the complex production systems of many companies. Artificial intelligence is likely to be affected in the future if precautions are not taken in time.
    • 5G technology in phones: Several companies around the globe are already working to bring this technology to their users, as well as Huawei of China and the Swedish company Ericsson. This technology had already been launched in test mode in 2019, but it is expected that by 2020 it will spread throughout the world. Being one of the most promising networks for this 2020, the 5G network does not escape on issues related to cybersecurity, since different studies indicate that this network will increase cyber attacks due to its high speed. If previously the 4G network could send 100,000 spam emails in just seconds, then the 5G network will send around 10 million in a few seconds.

 

  • Cloud Computing: Although it is not a system that can be as damaged as other technologies, this method can also be prone to cyberattacks, since every day more companies accumulate information in these spaces.

 

  • The internet: Being one of the main pollutants in terms of malicious malware, the internet does not escape these cyberattacks.
  • Facebook, Instagram, Gmail, WhatsApp: There are different companies that have access to our personal data, and it is there where the most expert cybercriminals attack these large companies to steal personal data, such as what happened in Yahoo in 2013, when the company was the victim of a cyber attack that affected more than 1000 user accounts.
  • Mobile applications: We must be careful what type of mobile applications we download on our phones, since the specialized company ESET recently revealed that a computer virus designed to display ads on the screen of phones, infected millions of cell phones through the operating system Android. According to the study, this virus has the ability to display malicious ads on phones in a pop-up manner during the process of installing an app.

This 2020 is loaded with a lot of uncertainty in issues related to cybersecurity, but don’t worry, you shouldn’t be alarmed, large companies work every day to mitigate these cyberattacks and strengthen technological infrastructures to make them less prone to these attacks.

If your company is unprotected, write us FREE to WhatsApp by clicking on the image and our panel of experts will answer all your questions.

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
Noticias | Amenazas más comunes en los Sistemas Informáticos

Most Common Threats in Computer Systems

Nowadays, cyberattacks are gaining momentum in this technological society that is increasingly interested in technology. Although there are countless threats, in this article we will analyze 3 of the most common that exist in Computer Security.

Cyberterrorism: This is one of the cyberattacks that has the greatest relevance in computer systems and in society. It consists of gathering information to the maximum, with the purpose of creating an environment of general terror and fear among the surrounding population. This attack can be directed at any type of institution, be it: government, people, hospitals, schools, etc.

Most experts believe that this attack is achieved for economic, political or religious purposes.

Cybercrime: This type of cyberattack goes beyond generating any fear in society, it usually occurs in many developed and underdeveloped countries with internet access. Through this attack, the so-called “hackers“, manage to interfere in the networks and computer connections in order to obtain economic gains. On the other hand, these hackers can also intercept technological devices, with the purpose of taking control and access to bank accounts, social networks, web pages and asking for large sums of money in exchange that the institution or the person cannot cover.

Cyberwar: The purpose of this attack, unlike Cyberterrorism, is that it is more linked to politics. How can it be generated? The criminals who handle these types of cyberattacks are those who seek to expose a reputable government or institution.

His idealism consists in collecting as much information as possible and then being exposed to the public, which could compromise any politician, official, public or private institution or the government itself.

An example of this is the case of Edward Snowden, a former computer scientist who worked for the CIA and who exposed classified, top-secret documents to the world that included massive surveillance programs at international level.

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail

Should your company have a monitoring system for its computer security?

Many companies today face problems related to cyberattacks that directly affect the infrastructure of computers, networks and Internet connections. Constant monitoring helps to avoid this type of attack and allows to maintain and ensure the continuity of the company, protecting your company with a safe and reliable system.

At Measured Security we offer you this type of security, where your company will no longer be exposed to these types of vulnerabilities or cyberattacks that could expose your personal information, providing security and protection to your files and personal data.

It is important that every company maintains a constant monitoring system, as well as a computer maintenance system to avoid possible attacks and infections between the same infrastructure of the equipment, for this, backup copies, backup or CDP maintenance are carried out.

How do we avoid these types of attacks?

Step 1

  • Behavior Analysis
  • Risk Analysis
  • Safety Baseline Diagnosis

Step 2

  • Definition of Scopes and service Levels
  • Incident Response Procedures

Step 3

  • Implementation of Monitoring and administration infrastructure

Step 4

  • Definition and Implementation of technological and Executive dashboards

What protection do we give your company?

Our objective goes much further and is that at Measured Security we focus on providing protection that extends to all computer areas of the company, offering:

  • Content protection
  • Protection in Social Networks
  • E-mail Protection
  • PC Equipment Protection
  • Smartphone Protection
  • Protection Against information Leakage/ Hijacking
  • Web Content Protection
  • PC Equipment Protection – Peripherals
  • Protection of Operational Enviroment

With this monitoring system, your company will be able to anticipate failures and incidents that may occur in its IT infrastructure, being able to detect these changes in time and thus avoid any leakage of confidential information.

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
Controles de seguridad CIS ¿Qué son y como debería utilizarlos?

CIS Critical security controls, What are they and how you should use them?

 

Cybersecurity has an extensive field, and it may seem that many inside the security of the information will never be able to “complete” it, but this no longer has to be the case.

Regardless of the Budget, it may seem impossible for many organizations to protect completely from every attack vectors, and the cyber risk can be challenging. Of course, most organizations have security budgets that are far from limitless. How should we line up its limited security resources for better protection against cyberattacks?

Here is where the CIS controls kicks in, also known as the 20 main CIS security controls.

What are CIS security controls?

CIS controls were created to answer a simple question, “What must a typical organization do to defend against known attacks?”

Controls are a set of 20 better practices measures that organizations can take to protect against cyberattacks. While focusing in a few highly efficient controls, organizations can drastically reduce cyber risks without breaking their budget.

CIS controls are effective for most organizations because they focus on most common attack vectors (the ones with the highest risks). These main threats are identified by some of the most reliable reports in the industry, like the Annual Report of Data Breach investigations from Verizon, and checked by a wide spectrum of cybersecurity experts.

Instead of individual organizations having to interpret and act these trends by themselves, CIS controls provides a guide of better actionable practices on how to protect against recent threats. Each year, controls are updated to reflect most of the important current threats.

CIS controls use for security and compliance

The advantages of CIS security controls are obvious. Controls represents the path of less resistance to protect against the most common cyber threats. Nevertheless, controls also have a great benefit for any organization that must comply with the industry framework. Why?, because for most, if not everyone, of the main compliances framework are closely lined up to CIS controls, as well as CIS reference points.

As a result, lining up with CIS resources can be considered a top priority for any organization that needs to minimize cyber risks while keeping compliance.

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail
Cómo reducir su superficie de ataque con el endurecimiento del sistema

How to reduce your attack surface with system hardening

 

In most cases, new digital assets such as servers and operative systems, comes in a non configured status. When you install an asset, everything is predetermined. All the app services are activated and all the ports are open. At the same time, mosto f the new assetsare not completely updated, they often require multiple software and firmware updates. Here is where the System hardening comes in.

System hardening is the process of configuring an asset according to the top security practices to reduce it’s vulnerability from cyberattacks. The process means to reduce the “surface attack” of the asset, disabling services, user accounts and unnecessary ports.

The purpose of System hardening is simple. The less the Surface attack of an asset is, that is to say less points of entry, the harder will be for a hacker to obtain a unauthorized access.

Establishment of a system reinforcement baseline

One of the most important steps in system hardening is to establish a baseline. This requires an initial evaluation of the “hardness” of the system in front of an established better practice frame.

In a recent publishing, we discussed about the function and importance of reference points from Center for Internet Security (CIS). The reference points of CIS are a set of configuration standards for better practices developed in consensus with a wide range of cybersecurity experts.

With over 100 comparable evaluations avalilable for a wide range of common commercial technologies the CIS comparable evaluations are the worldwide accepted standard for secure configuration. This makes them an ideal option for system hardening.

A baseline identification requires a manual evaluations or assisted by assets and system solutions to see how close they line up with relevant CIS reference points. This initial evaluation, along with clear documentation of any area in which the configuration does not reach a reference point, becomes a baseline.

Why is System hardening so important?

The system reinforcement is an essential function both for security and compliance.

From a security point of view, System hardening is an essential precursor of protective technologies like firewalls and EDR’s. If a system is not reinforced enough, meaning that is not configured and kept according to the best cybersecurity practices, it will never be safe, no matter how much you spend on cybersecurity technologies.

Make sure that every system stay “hardened” at all times by providing an alert and a clear remediation guide each time there is a non-compliance problem.

0 comment
0 FacebookTwitterPinterestLinkedinTumblrRedditStumbleuponWhatsappTelegramLINEEmail