Home Tech News Brazil, Mexico and Peru are the Latin countries with the most cyberattacks...

Brazil, Mexico and Peru are the Latin countries with the most cyberattacks in 2022

Brazil, Mexico and Peru are the Latin countries with the most cyberattacks in 2022
The detection time of a cyber attack in Latin America went from 2 months to 4 days

Cybercriminals are constantly on the search of new ways to violate the security and privacy of users and companies, with the aim of stealing sensitive information that can be used to generate cyber attacks involving the theft of money or data.

Sometimes, it involves entering the databases of companies of all kinds, regardless of their size, which leads to a information leak. These incidents not only represent a risk to the Business but also, for users who have some kind of link with it, so it is necessary to act quickly and acquire new infrastructure that allows to prevent future attacks.

According to the technology company IBMin an interview with TechMarkup, in the year 2022 the average cost of a data leak from a company was 2.09 million dollars, which represents an increase of fifteen % if compared to that registered in the year 2021. However, this is not the only variation that is registered. In the report “Prospects for Latin America” prepared by the company, it was indicated that the 60% of companies increased the price of their services after a data breach.

Cybersecurity situation in Latin America

[article_mb_code]

According to the data compiled by the technology company, Brazil, Mexico and Peru are the countries with the highest number of cyber attacks in the region, and phishing is also the modality most used by cybercriminals to carry them out. This method is characterized by infiltrating devices by impersonating companies or people who are credible in order to convince users to voluntarily provide personal information.

On the other hand, the ransomware was the main method of attack with a 61% of the reported cases and is characterized by the prohibition of access to data by users unless a ransom is paid for the information. Usually the transaction is done with cryptocurrencies to avoid tracking.

[article_mb_code]

However, progress has been made in the region in the fight against these situations of violation of cybersecurity.

One of them that was highlighted by IBM is the reduction in the duration of ransomware attacks, since they have decreased by 94%. It went from a period of 2 months to 4 days, something that means that companies and users have less time to respond adequately to cyber attacks.

During an exclusive interview for infobae, Gabriel CatropaDirector of Technology cybersecurity for Latin America of IBMdata breaches not only affect private companies, but the public sector is also at risk of being a victim of cybercriminals.

[article_mb_code]

“Companies are advancing very quickly in digital transformation, both the public and private sectors. This migration to the Cloud is dangerous for many reasons,” he stated.

IBM indicates that the detection time of cyberattacks has been reduced by 94%, going from lasting 2 months to 4 days.  PHOTO: Private Archive
IBM indicates that the detection time of cyberattacks has been reduced by 94%, going from lasting 2 months to 4 days. PHOTO: Private Archive

Although the digital transformation contributes to the user experience in both sectors, Catropa indicated that this can be dangerous if users start using the access keys of one sector in the services of another, which means that these areas of the organizations are affected at the same time in the event of a leak.

“A large part of the authentication of the systems are linked to our personal data, which is managed by the public entities”, indicated Catropa. “An attack that happens in the public sector can happen in the private sector because it uses the same data,” she said.

The representative of IBM also indicated that due to the relationship between public and private entities, using the same access keys can cause damage to the infrastructure used by both to serve users with their services. “If we have passwords or users, there is a habit of using the same password in both sectors, so many times there is a filtration which automatically occurs in the private sector”.

Keep reading:

Previous articleSNOW: Kit Harington talks about Game of Thrones spin-off
Next articleSpider-Man: Through the Spider-Verse gets 1st trailer; watch!