IT is something you are married to and cannot function without in today's society. It is almost the first thing you have to deal with when you wake up and often the last before you go to sleep. During the day you encounter it both at work and in your free time in modern society. These are things one does not always think about. Try sometime and try to manage a day without looking at the phone. -Exactly, it's pretty much impossible although we don't even admit it to ourselves.
Your phone, for example, often knows you better than your partner. It's on it you google all the big questions that you don't want to share with anyone and it's also the one you use when you need confirmation of something you don't believe in although everyone says so. It's the one you check symptoms on if you have any that you don't want to share and it's with it you even question things that you don't want anyone else to even think you're speculating about.
So the big question is, what do you do the beautiful day you wake up, open the phone or computer and notice that you are logged out. You first try to log in and think that this was probably again an update but notice that you don't get in however you review the password. Now you try to reset it. Oops, I have no recovery function or it refers to a number that is not from my home country.
Congratulations, you have been hacked.
Someone has gotten into your account and can now take part in your whole life. Via the search history or other search engine statistics, one now finds out exactly what you have done and searched for. The person can ask Google to describe you, who you are and what your interests and leisure activities are and even see what you loathe. Pleasant isn't it?
You certainly had Facebook, WhatsApp and other communication channels also connected so it's sweet entertainment for the person to go through everything and even at your expense now also be able to extort, steal others' identities and imitate both you, your partner, your children or relatives.
Why did this happen?
Why did this happen? Why just me? What did I do wrong and why didn't I see this happen.
We live in a dangerous time when we have generations who are blue-eyed by our surroundings. We have grown up in the countryside, we know every person more or less and know that although we do not always share all opinions with each other, we would never go into something as ugly as stealing another person's identity.
We have without being fully aware moved ourselves in about 20 years from our small home village to the global internet where 8.4 billion people reach each other regardless of where they are located or what time of day it is. Of these people, an estimated 6 billion people have direct access to the internet. That is thus ¾ of the whole world's population. To give you perspective, we are 5.6 million Finns so it means roughly 1000 times Finland's population moving out there.
During a day, approximately 2,200 cyber attacks occur, which gives an average of one attack every 40 seconds. Let this sink in for a bit.
Good, then we continue. Of course, we don't have a fixed number but the profiling is that there are globally about 20,000–100,000 professional hackers who I guarantee know their stuff.
Then we have, without being able to confirm but an estimation of, hundreds of thousands to over a million "script kiddies" who, with the help of programs, pry into a lot of things.
If we talk sums, just in such a short time as from 2020 where we had 111 million attacks to year 2025 with about 293 million attacks. Costs in 2022 were almost 8 trillion and it is forecast that this year it will reach 10.2 trillion. Again to give perspective, the Finnish national debt is about 240 billion right now, and to reach the same sum we have to multiply the national debt over 40 times. debtclock.io/finland in case anyone wonders where I fetched that sum from.
Can we stop this?
-No. No one can stop a skilled hacker. Period. But you can make their days less fun. The most important thing is to make the intrusion too difficult, expensive or time-consuming.
MFA
Already this small intervention makes the world a much more pleasant place and gives a peace of mind for sleep. Since it requires a physical device or biometrics, interest quickly ends.
EDR
Software that alerts when something alarming occurs or threatening behavior, even outside the normal bars.
ZTA
Ensure that your network and programs follow this architecture and most importantly, that your staff follows the references.
So in a nutshell: We are your partner if you want to take security measures into effect but have them explained and performed so that even your gang understands what it's about. This also applies to private customers and households.
Be Legendary!
Kasper Kronberg
CEO