Intelligent CIO LATAM Issue 12 | Page 34

EDITOR ’ S QUESTION
CLAUDIO MARTINELLI , GENERAL MANAGER FOR LATIN AMERICA AND THE CARIBBEAN , KASPERSKY

The world is undoubtedly ultraconnected now , especially driven by the Industrial Revolution 4.0 . It makes connectivity the basis for great opportunities and severe vulnerabilities , whether in conventional businesses , the industrial sector or critical infrastructure .

As a result , attackers are constantly aware of the latest trends and technologies to create as many victims as possible . Attacks have gone from basic and widespread to more complex and targeted , suggesting that cybercriminals constantly improve tactics and procedures .
consequences , such as halting business operations , exposing confidential information and causing a loss of confidence among investors and customers .
Attacks have gone from basic and widespread to more complex and targeted , suggesting that cybercriminals constantly improve tactics and procedures .
This scenario requires a new approach by CIOs to deal with cyberthreats and at Kaspersky , we believe that the most efficient solution to this challenge is the security by design approach or ‘ cyber-immunity ’.
It means the inclusion of security mechanisms from the earliest stage of the conception of a device to make the cost of carrying out a successful attack always greater than any potential benefit that cybercriminals may have from it .
Having a proactive cybersecurity strategy is crucial to protect any business or organization because a single cyberattack can cause catastrophic
A Kaspersky study indicates that only 48 % of companies in Colombia adopted new policies or additional requirements to improve digital security after suffering an incident . Curiously , 9 % of Colombian companies that had suffered a successful cyberattack did nothing to prevent future attacks .
In addition , although having the best security and best practices is crucial , training people within a company is essential . Otherwise , the organization will always have a weak point that will make it vulnerable to any attack .
It is also advisable that CIOs invest in threat intelligence to anticipate , isolate and prevent any attack . In this way , they will be one step ahead of the criminals and access threat information already present in other parts of the world or market segments . To invest in intelligence saves budget and directs training and cybersecurity efforts in the right direction .
On the other hand , unfortunately , many companies do not see cybersecurity as an investment and look to buy the cheapest option without considering the most efficient type of protection for their needs .
34 INTELLIGENTCIO LATAM www . intelligentcio . com