StartNews4-step approach could improve digital defense of businesses in 2025

4-step approach could improve digital defense of businesses in 2025

In a scenario where digital threats are constantly evolving, traditional cybersecurity measures no longer offer the necessary protection for companies. This is what the latest study by Akamai, a company specialized in security and performance solutions in the cloud, which has compiled years of research in a practical guide called “Defender’s Guide 2025”, shows.

The report comes at a critical juncture: Brazil ranks 4th among the countries with the most vulnerable SSH servers on the internet, with 1.2 million exposed systems that can serve as a gateway to attacks.In total, Akamai has identified more than 22 million at-risk infrastructures globally.

By applying technical analysis and research to their cybersecurity strategy, organizations can more effectively mitigate risk in an increasingly complex digital environment”, explains Claudio Baumann, managing director, Akamai Technologies.

The challenge of protecting complex environments

The study highlights common flaws that will require increased attention in 2025, including loopholes in authentication and network segmentation, secrets exposed in code repositories, and misconfigured VPNs. Another point of concern is the evolution of malware, which now operate without (fileless) files or adopt decentralized architectures, making them harder to combat.

In parallel, traditional vulnerabilities persist such as outdated equipment, Zero-Day failures and attempts at identity theft.Site defacement and abuse of Kubernetes are also mentioned as significant risks.

“Cyber attacks can be launched even by amateur criminals, while specialized groups are becoming increasingly skilled.And we still have artificial intelligence, making the risks even deeper”, Baumann warns.

The strategy in four stages

To strengthen digital defense in 2025, Akamai recommends a four-step structured approach:

  1. Implementation of digital hygiene measures: Constant software updates, tight access control, and continuous training of employees and executives to combat common threats.
  2. Use of security and targeting platforms: Implementation of firewalls, API protection systems and distributed architecture, creating layers of defense against denial of service attacks.
  3. Priority protection for critical services: Identification and enhanced protection of business-critical systems, avoiding compromise of operations, revenue and reputation.
  4. Specialized incident response teams: Preparing to mitigate damage and restore operations quickly when attacks occur, recognizing that intrusions are virtually inevitable.

The report points out that risk quantification metrics, although widely applied, are challenging in practical execution.“It is impossible to generalize, while replicating an existing model is extremely difficult as it depends on the size, sophistication and criticality of each operation, within individual corporate structures”, concludes Baumann.

The key message is clear: to address the 2025 threat landscape, businesses will need to move beyond conventional strategies, taking a personalized and proactive approach, aligned with their industry specifics and emerging cyberattack trends.

E-Commerce Update
E-Commerce Updatehttps://www.ecommerceupdate.org
E-Commerce Update is a leading company in the Brazilian market, specializing in producing and disseminating high-quality content about the e-commerce sector.
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

RECENT

MOST POPULAR

[elfsight_cookie_consent id="1"]