In a scenario where digital threats are constantly evolving, traditional cybersecurity measures no longer provide the necessary protection for companies. This is what the latest study by Akamai, a company specializing in cloud security and performance solutions, indicates, which compiled years of research into a practical guide called "Defender’s Guide 2025."
The report comes at a critical moment: Brazil ranks 4th among countries with the most vulnerable SSH servers on the internet, with 1.2 million exposed systems that could serve as an entry point for attacks. In total, Akamai identified more than 22 million infrastructures at risk worldwide.
“By applying technical analysis and research to their cybersecurity strategy, organizations can more effectively mitigate risks in an increasingly complex digital environment,” explains Claudio Baumann, CEO of Akamai Technologies.
The challenge of protecting complex environments
The study highlights common failures that will require extra attention in 2025, including authentication and network segmentation gaps, exposed secrets in code repositories, and misconfigured VPNs. Another point of concern is the evolution of malware, which now operate filelessly or adopt decentralized architectures, making them more difficult to combat.
Meanwhile, traditional vulnerabilities such as outdated equipment, Zero-Day flaws, and identity theft attempts persist. The disfigurement of sites and the abuse of Kubernetes are also mentioned as significant risks.
“Cyberattacks can be launched even by amateur criminals, while specialized groups are becoming increasingly skilled. And then there’s artificial intelligence, making the risks even more profound,” warns Baumann.
The four-step strategy
To strengthen your digital defenses in 2025, Akamai recommends a structured, four-step approach:
- Implementation of digital hygiene measures: Constant software updates, strict access control and ongoing training of employees and executives to combat common threats.
- Use of security and segmentation platforms: Implementation of firewalls, API protection systems and distributed architecture, creating layers of defense against denial of service attacks.
- Priority protection for critical services: Identification and reinforced protection of business-critical systems, avoiding compromise of operations, revenue and reputation.
- Specialized incident response teams: Preparedness to mitigate damage and restore operations quickly when attacks occur, recognizing that intrusions are virtually inevitable.
The report highlights that risk quantification metrics, although widely applied, are challenging in practical implementation. "It is impossible to generalize, as replicating an existing model is extremely difficult, since it depends on the size, sophistication, and criticality of each operation within individual corporate structures," concludes Baumann.
The key message is clear: to face the 2025 threat landscape, companies will need to go beyond conventional strategies, adopting a personalized and proactive approach, aligned with the specificities of their industry and emerging cyberattack trends.