Home » Cyber ​​attacks on companies would be carried out in less than a day

Cyber ​​attacks on companies would be carried out in less than a day

by admin
Cyber ​​attacks on companies would be carried out in less than a day

In today’s world, where technology plays a vital role in service delivery, cyber attacks have become a constant threat to various organizations. Recently, Salud Total EPS was the victim of a cyber attack that compromised not only its system, but also the security and privacy of its users’ information. This incident highlights the importance of strengthening cyber defenses for both organizations, companies, as well as the end consumer.

María Claudia Ardila, Sophos sales director for the South America region

María Claudia Ardila, Sophos sales director for the South American region, expressed that one of the most important assets that an organization has is information, since when they receive a cyber attack it is very likely that 95% of their income will be lost. affect: “Currently, we have cybercriminals who are attacking this asset, which is known as ransomware or information hijacking. Year after year it has increased by 64%. It means that this cybercrime is being monetized, it is being prepared, it is very changing, cybercriminals are very sophisticated and are increasingly finding new techniques to attack organizations.”

He added: “It is important for organizations to stay up to date on the latest cybersecurity threats in order to protect themselves from the latest attacks.” The period that cybercriminals require to commit the crime, known as dwell time, has experienced a reduction, going from 10 days in 2022 to 8 days in 2023. In the case of ransomware attacks, this time has been reduced. reduced to just two days.

Additionally, attackers manage to access an Active Directory or main server in less than a day, approximately 16 hours on average. This component is of utmost importance for any company, as it stores crucial information, such as user, computer and server data, used to authenticate and authorize access to network resources. Once this access is gained, attackers can easily carry out a wide range of malicious activities.

You may also like

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More

Privacy & Cookies Policy