fbpx
Size of letters 1x
Site color
Image
Additionally
Line height
Letter spacing
Font
Embedded items (videos, maps, etc.)
 

How to prevent cyber hacking attacks: explanations and recommendations from BDO Digital cyber experts

18/ 01/ 2022
  In response to the event that became known all over Ukraine last Friday, BDO Digital cybersecurity experts prepared comments on what precautions can protect against hacker intrusions. We recall that on the night of January 14, there was a large-scale hacker attack on 15 state web resources. The websites of the Ministry of Defense, the Ministry of Foreign Affairs, the State Emergency Service, Diia and others did not work. It is likely that the attack took place centrally through one infrastructure that links all these web portals. According to a number of reputable publications, the hacking of government sites succeeded due to the failure to comply with proper cybersecurity measures. This poor experience should be an example of what should not be done. Here are some recommendations on how to prevent similar and even more threatening attacks for corporate businesses and the community as a whole: 1) update software in a timely manner and develop an infrastructure development strategy; 2) monitor trends in cyber incidents and improve the organization’s information security system; 3) periodically monitor an area of attack for the organizations existing digital assets in the external environment (including web applications); 4) conduct information security and penetration testing audits from time to time in accordance with international or industry standards (such as ISO2700*, COBIT, PCI DSS, etc.). Read also: BDO in Ukraine enhances digital transformation services with the launch of BDO Digital Continuous penetration testing of web applications, according to BDO Digital experts, is a real “panacea” for such hacker interventions and subsequent possible modification/encryption of infrastructure elements or even theft of sensitive information. Together with our partner, IMMUNIWEB®, we offer a complete solution with the ImmuniWeb Continuous product. Unlike conventional or ad hoc penetration testing, continuous testing can provide increased security guarantee and significantly reduce cyber breach. This technology constantly scans and monitors web applications and APIs 24/7 for any changes or updates in the code and functionality. Join our Telegram channel to keep abreast of the topical business news. Combining artificial intelligence technology with human experience, these services are able to outpace traditional cyber defenses and provide the most flexible and versatile tools to combat hacker threats. To ORDER the service, please call +38 050 380-96-01 or write to [email protected] In addition to testing web applications for critical vulnerabilities, BDO in Ukraine provides the following Cybersecurity services: Connection to the center for monitoring and responding to cybersecurity incidents (Security Operation Center, SOC) Scanning for vulnerabilities of the organizations web services Conducting penetration tests Identification of hacks and information leaks Code review of applications and services Continuous monitoring of the outside perimeter of the organization

In response to the event that became known all over Ukraine last Friday, BDO Digital cybersecurity experts prepared comments on what precautions can protect against hacker intrusions.

We recall that on the night of January 14, there was a large-scale hacker attack on 15 state web resources. The websites of the Ministry of Defense, the Ministry of Foreign Affairs, the State Emergency Service, “Diia” and others did not work. It is likely that the attack took place centrally through one infrastructure that links all these web portals. According to a number of reputable publications, the hacking of government sites succeeded due to the failure to comply with proper cybersecurity measures.

This poor experience should be an example of what should not be done. Here are some recommendations on how to prevent similar and even more threatening attacks for corporate businesses and the community as a whole:

1) update software in a timely manner and develop an infrastructure development strategy;

2) monitor trends in cyber incidents and improve the organization’s information security system;

3) periodically monitor an area of attack for the organization’s existing digital assets in the external environment (including web applications);

4) conduct information security and penetration testing audits from time to time in accordance with international or industry standards (such as ISO2700*, COBIT, PCI DSS, etc.).

Read also: BDO in Ukraine enhances digital transformation services with the launch of BDO Digital

Continuous penetration testing of web applications, according to BDO Digital experts, is a real “panacea” for such hacker interventions and subsequent possible modification/encryption of infrastructure elements or even theft of sensitive information.

Together with our partner, IMMUNIWEB®, we offer a complete solution with the ImmuniWeb Continuous product. Unlike conventional or ad hoc penetration testing, continuous testing can provide increased security guarantee and significantly reduce cyber breach. This technology constantly scans and monitors web applications and APIs 24/7 for any changes or updates in the code and functionality.

Join our Telegram channel to keep abreast of the topical business news.

Combining artificial intelligence technology with human experience, these services are able to outpace traditional cyber defenses and provide the most flexible and versatile tools to combat hacker threats.

To ORDER the service, please call +38 050 380-96-01 or write to [email protected]

In addition to testing web applications for critical vulnerabilities, BDO in Ukraine provides the following Cybersecurity services:

  • Connection to the center for monitoring and responding to cybersecurity incidents (Security Operation Center, SOC)
  • Scanning for vulnerabilities of the organization’s web services
  • Conducting penetration tests
  • Identification of hacks and information leaks
  • Code review of applications and services
  • Continuous monitoring of the outside perimeter of the organization

If you have found a spelling error, please, notify us by selecting that text and pressing Ctrl+Enter.

Start
in the Telegram bot
Read articles. Share in social networks

Spelling error report

The following text will be sent to our editors: