Close this search box.

The threats that have got Europol worried

The threats that have got Europol worried

The threats that have got Europol worried

Unfortunately, nowadays there are more and more threats that can bring our company’s corporate cybersecurity into trouble: ransomware, cryptojacking, denial of service attacks, BEC fraud… The range of possibilities is almost unlimited, and worse it keeps growing. But what are the biggest threats? Which of the possible options are the most common, the most difficult to deal with and above all the most harmful to our computer security? to Europol. In its 2018 report, the Internet Organized Crime Threat Assessment (IOCTA), the agency provides data not only on the most dangerous threats, but also on those that are growing fastest, or those that have not. They usually pose a serious risk, they have stepped up their game in recent years to attack companies, public bodies or educational institutions, among others.

The following are just a few examples:

1- Ransomware

Without a doubt, ransomware remains the absolute king of cybercrime, although we’ve seen a surprising development. While these types of attacks are still on the rise, their rate of growth is slowing somewhat. In this case, it is still the most common way to attack companies for financial reasons, so its progress remains a concern. It’s not trivial: last year, more than 100 million users worldwide were affected by the Equifax cyberattack. , so the threat of
ransomware remains a constant. Looking ahead, Europol predicts that these types of attacks will “shift” and shift their focus to mobile devices, both in the public and private spheres.

2- Cryptojacking

This trend is one of the newest and therefore more dangerous as it may be unknown to companies and users. Cryptojacking doesn’t need to steal our information or access our banking details. . It intends to use our mobile device to mine cryptocurrencies, a practice that ends up consuming our company’s computing resources without us realizing it. Whether through malware or hacking of the websites we visit, this practice can cause computer problems at the company or even seriously compromise the company’s cybersecurity. Worst of all, given the current threat, many organizations are failing to take action against the damage it can cause.

Furthermore, this threat is directly linked to another one: the increase in frequency with which cyber criminals are turning to cryptocurrencies, either to cover their tracks or to launder the money they receive from cyber-attacks on businesses and institutions.

3- Social engineering

Phishing continues to be another of the most common forms of attack used by cybercriminals, accessing corporate data they logically should never have had their hands on. There are some particularly notable cases, such as B. BEC fraud. Here, cyber criminals pose as directors of a company in order to obtain confidential information or financial benefits from employees. Another notable case is the tech support scam.

How to avoid these threats?

  • Prevention and cyber resilience Businesses cannot wait for an attack and try to stop They must act pre-emptively and be aware of new cyber-attack strategies so that no new method catches them.
  • Surprise Advanced cybersecurity At the same time, it is important to have technological solutions that help maintain corporate cybersecurity.
  • Panda Adaptive Defense not only fights against predictable attacks, but most importantly, anticipates all types of potential threats, monitors the activities of each organization in real time, and stays one step ahead.
  • Raising employee awareness as always as stated, employees are often the most effective entry point for That’s why companies not only have to make their employees aware of what they should and shouldn’t do;
  • They must also have clear protocols of action in place where these employees suspect a possible threat may be at the doors.

Share to Social Media

Leave a Comment

Your email address will not be published. Required fields are marked *

Recent Articles

Join Our Newsletter