Every day, millions of
computer attack
attempts are thwarted thanks to security systems.
For this reason, "cybersecurity is vital," says
José Miguel Ruiz Padilla
, director of cybersecurity at Babel, a company that proposes digital transformation solutions and offers services to prevent
hackers
from acting.
"Computer
systems
have to be protected
,
with good
EDR
(equipment protection systems) because attack attempts are going to increase. In addition, everything that has an electronic component is exposed to being hacked," says
Ruiz Padilla.
But what happens when a computer attack occurs
?
"
It should be noted that
cybercriminals
are 'submerged', that is, we cannot see them. They take advantage of this to exploit system vulnerabilities", she specifies.
For this reason, its detection "is not so easy."
Once the incident is discovered, the
response phase
and its corresponding protocols are activated.
To try to block the attack,
The remediation stage
begins .
"The evidence of what happened in the incident is obtained, why it happened and
how it can be avoided
so that it does not happen again, which is known as 'doing a forensic' and determining how far the attack could go," he says. Babel's director of cybersecurity.
"The attacker begins to see what are called
lateral movements
to try to obtain administrator permissions and access system information," explains Ruiz Padilla.
more frequent attacks
Phishing
dominate
the type of attacks.
They consist of sending an email that contains a document or link.
"If you access it, it takes you to
malware , a virus, and causes
ransomware
to enter a device ,
which prevents the user from accessing their system or their personal files," warns Ruiz Padilla.
In addition,
phishing
then demands the payment of a ransom to be able to dispose of them again.
They account for
70% of daily incidents
and "do not require technical sophistication to achieve their goal."
The best-known
blocking tools
are antivirus and
firewalls
, which constantly scan everything that goes in and out of a
computer system
and determine if it's allowed, legal, or flagged as suspicious.
Currently,
vehicles
manufactured in recent years are being attacked, "because they already have digital systems and cybercriminals take advantage of
any security flaw
. We must bear in mind that everything that is designed has flaws to a greater or lesser extent, nothing is perfect", concludes Babel's cybersecurity manager.
Conforms to The Trust Project criteria
Know more