Cybersecurity: practical tips to avoid 99% of cyber attacks
- Kreo Estrategias
- Oct 25, 2022
- 2 min read
The weakest link in any system is usually the USER.

Cybersecurity must be a topic of interest for every company member, not limited to the IT department.
We should know some cyberattack statistics:
Every 10 seconds, a new device is the victim of ransomware or digital hijacking.
One out of two cyberattack victims is successfully attacked again in less than a year.
In 2021, the number of officially reported digital identity thefts increased by 54%.
In 2021, 14 million spam emails related to sextortion were detected. Sexual extortion is when the person is induced or blackmailed with an image or video of themselves naked or performing sexual acts.
69% of malware (malicious software) variants target Windows-based devices.
Malware variants increased by 47% compared to the previous year.
Phishing scams (impersonation) increased by 667% compared to previous years.
Last year, $16 billion in ransoms were paid to release ransomware-hijacked devices.
$19.2 million is the average annual cost of cybersecurity incidents caused by disloyal employees.
Top nine motivations of cybercriminals
Install unwanted programs (virus-type malware, spyware, adware, keyloggers)
Hijacking data, devices, or loss of information (via Ransomware)
Leakage of passwords on the Dark Web (obtained with Phishing)
Connection monitoring, fingerprint, and device control
Theft of money, money laundering, or financing of terrorism
Hijacking of user accounts or bank accounts
Industrial espionage or competitive intelligence
Modification of data and critical information
Denial of service
Among the most common attack channels:
Clicking on a link: emails, files, websites, or social networks.
Clicking on an image: emails, USB keys, websites, etc.
When downloading or opening files: pop-up windows, advertising banners, emails, or files.
By not having controls or measures: trained people, secure programs, systems, networks, etc.
Through misconfigured or outdated programs or operating systems.
Through social engineering, tricking or manipulating victims.
In all of them, it is essential that there is an error or negligence on the part of the user, who is the person who uses the devices and is responsible for their proper maintenance. The weakest link in any system is usually the USER.
These are the eight most severe consequences of suffering a cyber attack:
Contagion or infection to other devices connected to the same network or external
The decreased trust of your environment, other users, or customers
Personal or business reputational crisis
Possible legal repercussions
Reduced productivity
loss of information
economic damage
Waste of time
12 practical tips to avoid 99% of cyber attacks:
Have an antivirus program installed and always updated.
Be suspicious of all downloads and attachments.
Be suspicious of all strange emails or emails that you don't expect to receive, especially if they are from an unknown sender or if they include files with unusual extensions (ex .EXE).
Always keep your operating system updated, check with your technology area.
Manage your passwords well: choose them with a certain degree of complexity and change them often.
Your cell phone or tablet is as or more vulnerable than your computer: protect them
If you share a device, create a user for each person.
Before buying online, check the reliability of the website.
Do security back ups in multiple sites and frequently.
Sign out when finished, especially on shared or public devices.
Always be suspicious of the security of third-party WiFi networks.
In cybersecurity, the best prevention is continuous training.
If you have any questions, contact the IT department of your company.
Contact: Mario Barboza | mbarboza@grupocomeca.com





Comments