Intelligent CIO LATAM Issue 01 | Page 35

EDITOR ’ S QUESTION

Today we live in a completely different world than we did a year ago . Suddenly there are new problems to challenge ourselves at a speed we weren ’ t used to .

When we look at the various sources of information available on cyberattacks , in this new environment , it is clear that this strategic change in direction from digital criminals , has seen them abandon mass attacks in favor of much more targeted ones . It ’ s clear this is for the simple reason that this leads to better results . question we have is : How do we protect ourselves from something we don ’ t yet know about .
In this challenging environment , knowledge is the key to success . Here are three simple protective tips :
1 . Understand the challenges , accept that the opponent is strong and prepared , and then develop protection strategies that not only identify potential threats and their strategies , but also how to proactively act on identifying these new vectors .
Through relentless searches for potential vulnerabilities and the consequent discovery of multiple gateways , cybercriminals create specialized attacks on these targets that have proven to be much more effective and cost-effective in all aspects .
Even so , we see greater exposure of access devices caused by the migration of the workforce to the remote home environment , which thus presents enormous opportunities for a single element of this universe to be violated and , consequently , used as access to corporate networks , without any protection against this new ‘ internal enemy ’ that until then existed in an infinitely smaller volume .
We have a wide universe of devices of all kinds , which no longer undergo the same centralized management and monitoring of corporations but are now also exposed to violations and failures of home networks that quickly integrated into corporate infrastructure in response to the urgent demand for business .
2 . Understand your business , the interdependence of computational resources , key points of interconnection and exposure , and then add to it all the knowledge about threats that is available and at your fingertips .
3 . Recognize the probability of failure that is inherent in each system we develop ; accept that this
In this challenging environment , knowledge is the key to success .
probability is relentlessly exploited by cybercriminals and , in the best possible way , apply the various tools and technologies that we have mastered and that we can use for our benefit .
In conclusion , accepting that there is no magic formula that solves all problems is fundamental , because our opponent does . p
Cybercriminals realized that as quickly as we are at the forefront of combating these actions and developing a new way of acting , their danger is increasing in proportion to these new arrangements . And the
EDILSON CANTADORE , SALES ENGINEER FOR LATIN
AMERICA , SONICWALL
www . intelligentcio . com INTELLIGENTCIO LATAM 35