The new normality revolutionized the world. From one moment to another, physical companies migrated to remote ones. Consequently, teleworking is the latest trend in business. However, this urgent labor situation has negative consequences. Among them, the vulnerability of companies in terms of cyber security. Mainly, in terms of technological conditions and trained personnel.

cyber security 2021

According to the Bitdefender Business Threat Landscape Report 2020, most companies are not aware of the danger they are in. Sixty percent say they didn’t know they were vulnerable to attacks until they were attacked. Unpatched vulnerabilities, for example, are an example of this. In this order, the report shows that 64% of vulnerabilities in applications and operating systems are prior to 2018. This time frame is a great opportunity for cyber-crooks.

Most common vulnerabilities

Likewise, Bitdefender reports that most of these vulnerabilities are in Microsoft products and services. Also in network analysis tools used by IT and security professionals and developers. Similarly, in device management solutions. On the other hand, attacks through IoT devices have grown by 64%. Similarly, bad configurations of the WinRM service represent a major danger. Through them, cyber-crooks can easily compromise a company’s technological infrastructure and devices. In 2020, 87% of cases of misconfiguration were related to this service.

The report also states that in the first half of the year, around 17% of threats detected in Spain were ransomware. Furthermore, for this same period, cryptocurrency mining fluctuated between 28% and 11%. And unwanted applications were the cause of approximately 16% of attacks.

Protection measures you can take

Although the outlook is not encouraging, there are steps to be taken. These can decrease vulnerability in terms of cybersecurity by 2021. Among them are that companies make an analysis of their cybersecurity conditions. In this way, they will recognize in which aspects they can be most easily attacked. And consequently, acquire configurations and implement patch policies. Other strategies would be to properly configure WinRM services. Also, constantly update your home routers and do not reuse old passwords. Finally, ensure that employees corroborate suspicious emails.

Leave a Comment

Your email address will not be published. Required fields are marked *