In a scenario where digital threats are constantly evolving, traditional cybersecurity measures no longer provide the necessary protection for businesses. This is highlighted in the latest study by Akamai, a company specializing in cloud security and performance solutions, which compiled years of research into a practical guide titled “Defender’s Guide 2025”.
The report comes at a critical time: Brazil ranks 4th among countries with the most vulnerable SSH servers on the internet, with 1.2 million exposed systems that can serve as entry points for attacks. In total, Akamai identified over 22 million at-risk infrastructures globally.
“By applying technical analysis and research to their cybersecurity strategy, organizations can mitigate risks more effectively in an increasingly complex digital environment,” explains Claudio Baumann, General Manager of Akamai Technologies.
The challenge of protecting complex environments
The study highlights common vulnerabilities that will require increased attention in 2025, including gaps in authentication and network segmentation, exposed secrets in code repositories, and misconfigured VPNs. Another concern is the evolution of malware, which now operates fileless or adopts decentralized architectures, making it harder to combat.
At the same time, traditional vulnerabilities persist, such as outdated equipment, Zero-Day flaws, and identity theft attempts. Website defacement and Kubernetes abuse are also mentioned as significant risks.
“Cyberattacks can even be launched by amateur criminals, while specialized groups are becoming increasingly skilled. And we also have artificial intelligence, making risks even more profound,” warns Baumann.
The four-step strategy
To strengthen digital defense in 2025, Akamai recommends a structured approach in four steps:
- Implementation of digital hygiene measures: Constant software updates, strict access control, and continuous training for employees and executives to combat common threats.
- Use of security and segmentation platforms: Implementation of firewalls, API protection systems, and distributed architecture, creating layers of defense against denial-of-service attacks.
- Priority protection for critical services: Identification and enhanced protection of business-critical systems, preventing operational, revenue, and reputational damage.
- Specialized incident response teams: Preparation to mitigate damage and restore operations quickly when attacks occur, recognizing that breaches are practically inevitable.
The report emphasizes that risk quantification metrics, although widely applied, are challenging in practical execution. “It’s impossible to generalize, while replicating an existing model is extremely difficult, as it depends on the size, sophistication, and criticality of each operation within individual corporate structures,” concludes Baumann.
The main message is clear: to face the threat landscape of 2025, companies will need to go beyond conventional strategies, adopting a customized and proactive approach aligned with their sector’s specifics and emerging cyberattack trends.