Post by account_disabled on Feb 22, 2024 5:23:34 GMT -5
If we take into account that global cybersecurity spending is $ billion, more than , this attack accounted for of the entire global budget for a single attack. cybersecurity-war-russia-ukraine- Possible risks for companies and individuals The formulas chosen by these cybercriminals are different: Many of them are based on ransomware or ransom attacks, that is, attacks in which a ransom is requested for the blocking of certain web pages, systems or data. Methods such as DDoS or denial of services are also used, that is, by using bots included in thousands of computers they try to access a system or website at the same time, causing it to collapse and block.
On a personal level, the user can suffer attacks on their own devices if they are not properly protected, but generally, most attacks occur on a large scale against government pages, banks or large companies. For example, if a cyber attack Whatsapp Number List occurs at the government level, services such as Clve or health portals such as the public health patient portal may be affected. , if an attack occurs on these pages, business data and passwords may be compromised and it will not be possible to carry out online procedures with the Public Administration. In addition, other procedures are appearing that take advantage of people's good faith : social media campaigns, email marketing or instant messaging platforms to request help to send food or aid to people affected by war.
They are classic scams adapted to technology and the current context. Thus, people are beginning to talk about the “person trapped in Ukraine” or “grandpa scam” scams , where the cybercriminal desperately asks victims for money to get a family member out of the conflict zone. Pablo Rodríguez, head of cybersecurity at Súmate, warns about the current context: “ In the times we live in, cybersecurity should no longer be considered a luxury for companies, but rather a necessity as basic as day-to-day work. Not being prepared for an attack, and therefore suffering from it, means downtime in the affected systems, which leads to an economic outlay to try to solve it, possible sanctions and most importantly: a loss of trust on the part of our clients.
On a personal level, the user can suffer attacks on their own devices if they are not properly protected, but generally, most attacks occur on a large scale against government pages, banks or large companies. For example, if a cyber attack Whatsapp Number List occurs at the government level, services such as Clve or health portals such as the public health patient portal may be affected. , if an attack occurs on these pages, business data and passwords may be compromised and it will not be possible to carry out online procedures with the Public Administration. In addition, other procedures are appearing that take advantage of people's good faith : social media campaigns, email marketing or instant messaging platforms to request help to send food or aid to people affected by war.
They are classic scams adapted to technology and the current context. Thus, people are beginning to talk about the “person trapped in Ukraine” or “grandpa scam” scams , where the cybercriminal desperately asks victims for money to get a family member out of the conflict zone. Pablo Rodríguez, head of cybersecurity at Súmate, warns about the current context: “ In the times we live in, cybersecurity should no longer be considered a luxury for companies, but rather a necessity as basic as day-to-day work. Not being prepared for an attack, and therefore suffering from it, means downtime in the affected systems, which leads to an economic outlay to try to solve it, possible sanctions and most importantly: a loss of trust on the part of our clients.