How to prepare for the first cyber blackout of 2025?

The increasing reliance on interconnected digital systems has transformed the cybersecurity infrastructure into one of the key pillars of the global economy. However, this connectivity has also exposed critical vulnerabilities. According to an IBM report, in 2023, the average cost of a data breach reached a record of $4.45 million, reinforcing the financial impact of errors and hacker attacks.

In recent years, the world has witnessed a series of detrimental incidents affecting companies and users. In July, a flaw in one of the CrowdStrike security systems affected 8.5 million computers worldwide. In 2022, the attack on the Colonial Pipeline in the United States paralyzed a significant portion of the country’s largest pipeline network, disrupting fuel supply and causing a temporary crisis.

Incidents like these, besides causing billions in financial losses, compromise personal and strategic information, underscoring the urgency of robust cybersecurity strategies. The question now is no longer if a collapse will occur, but when and how organizations are preparing to mitigate the impacts of the next cyber blackout.

“Cyber ‘blackouts’ not only jeopardize business operations but also expose governments to vulnerabilities, disrupting critical services and compromising sensitive data,” analyzes Guilherme Barbosa, Systems Engineer at  Unentel, a distributor of technological solutions for the B2B market. The specialist warns that ransomware attacks and failures in critical systems, like CrowdStrike’s, could trigger true global blackouts if not combated with robust approaches to cybersecurity.

To tackle this challenge, it is imperative to adopt preventive measures. With digitization, the global economy has become heavily reliant on cloud computing, focusing on an increasingly small number of providers of these services; but diversifying technology suppliers diminishes reliance on a single point of failure, while creating incident response plans ensures that operations can swiftly resume in the event of an attack.

In addition, investment in advanced technologies, such as artificial intelligence to detect anomalies and enhanced encryption systems, is essential to protect sensitive data. Continuous training of teams is crucial, ensuring that employees are equipped to identify and address threats, implementing effective cybersecurity practices.

“Diversifying suppliers and adopting robust incident response plans are the first actions that companies and governments must take to mitigate the impacts of a cyber blackout. Although the risk is real, severity can be significantly reduced with efficient information exchange and agile response to large-scale attacks,” concludes Guilherme.