Vsebina košarice

Vaša košarica je prazna.

Cena

The number of cyberattacks continues to grow

10. 10. 2022

During European Cybersecurity Month Telekom Slovenije’s Cybersecurity Operations Centre warns that the number of cyber and security incidents continues to grow. Over the past year Telekom Slovenije tackled 22% more cyberattacks than during the year before, which had already been a record year.

The number of cyberattacks, which can either target individuals or businesses of all sizes, has also grown since the start of the war in the Ukraine.

​The most frequent security incidents are malware (worms, trojans, etc.) and ransomware that attackers most often deliver to the victim through phishing attacks or software vulnerabilities. By frequency, they are followed by DDoS attacks and data loss, disclosure and/or theft. Telekom Slovenije’s Cybersecurity Operations Centre has also noted a major growth in abuse or attempted abuse of login data (passwords, personal data, payment card data), along with the growing attempts of scanning internal and external networks.


“Cybercriminals are actively searching for gaps and vulnerabilities in systems and business processes in order to get their hands on valuable business data or to disable operation of services; basically, anything they can turn into money by selling information or data, or by blackmailing companies, organisations, institutions and individuals. At the Cybersecurity Operations Centre we are constantly detecting, monitoring and discovering attacks, and with a potential attack, a fast and coordinated response is paramount. Increased digitalisation has further increased information risks,” emphasised Janez Anžič, director of Telekom Slovenije’s Service and Operations Centre, adding that “ensuring information security is a process that is never completed. At the global level we collaborate with different organisations and adopt additional measures for increasing security both of our services, as well as the services we provide to our customers, with our full cyber response team at high alert to immediately react if a security incident occurs.”

Telekom Slovenije uses the Cybersecurity Operations Centre for its own needs, as well as for ensuring the security of individuals, businesses of all sizes, organisations and events. They provided cybersecurity services during the Slovenian presidency of the EU Council. Protection from DDoS attacks is also provided to organisations abroad that use their internet access.

Residential and business users can opt for the services Varen splet (Secure Net) and Varen poslovni splet (Secure Business Net), which protect mobile phones and computers connected to the internet from online fraud and from downloading malware, as well as from attempts of personal data theft or abuse. Just in August of this year these two services protected the users from approximately 1.2 million online threats, and the number is growing every month.

Small and medium businesses are especially vulnerable, as they often lack dedicated security experts and have not implemented sufficient cybersecurity. Telekom Slovenije offers an attractively priced bundle of services for just this segment that includes the implementation of technical solutions, expert support and monitoring security events 24/7/365. Telekom Slovenije provides enterprise customers with additional support and consulting, security system reviews, reviews of compliance with information security policies and standards, and reviews of suitability of technical measures for protecting personal data.

Telekom Slovenije continues to invest in technologies for advanced threat detection, in-depth analytics, increased level of automation of operative processes and different security and intrusion tests. The company also monitors hackers’ activities on the open and the dark web, indicators of a cyberattack on companies, as well as whether the data from an assaulted company has surfaced on the dark web. At the moment the company is implementing new solutions for active response to cybersecurity incidents in line with the zero-trust principle.