Auto-translation used

Tech industry experts explain how cyber security solutions for businesses are transforming due to the evolution of online threats

According to Lookout data, in the third quarter of 2024, 18.4% of iOS and 11.4% of Android users fell victim to phishing attacks. In addition, cybercriminals are increasingly using artificial intelligence (AI) to impersonate another person and bypass security measures. In the first half of 2024, cyberattacks based on AI increased by 600%.  

Although the number of cyberattacks is not decreasing, technology development allows businesses to strengthen their systems. In 2025, companies must consider new challenges due to the evolution of cyber threats and use passwordless technologies, real-time threat analysis, and the Zero Trust model.  

True Value Added IT distributor BAKOTECH asked leading cybersecurity experts how companies should adapt to the new cyber reality and what protection mechanisms to use for data security online. Oleg Naumenko, CEO at Hideez Group, and Boubker El Mouttahid, Global Technical Director at Skyhigh Security – talk about the importance of global digital security principles for businesses, describe the evolution of cyber threats with the rise of AI, and mention the signs of a secured infrastructure.

Global values and principles of digital security for business  

More than 5 billion people use the Internet every day. Therefore, cyber security is a masthead of responsible business conduct and an essential issue of government regulation to protect end users.  

Initiatives such as the Global Digital Security Coalition at the World Economic Forum (WEF) bring together countries worldwide to address digital security challenges collectively.  

Following WEF research, online services must adhere to four key principles of digital security:  

  • Built-in security in business processes. Businesses must integrate digital security into all stages of a product or service's lifecycle, for example, by developing threat response protocols, implementing risk management systems, and adhering to international cybersecurity standards.  
  • A multidisciplinary approach to security. Digital security should be part of the corporate culture, encompassing technology solutions, data protection policies, educational initiatives for employees and users, and tools for self-management of risks.  
  • Innovative and risk-oriented security methods. Businesses must implement advanced risk and threat analysis technologies, such as artificial intelligence, to detect anomalies in user behavior, automated threat detection systems, and flexible access control policies.  
  • Transparency and responsibility. Transparency in security policies, reporting to users and partners, and clear incident response procedures are critical to building trust in digital services.  

Adherence to these principles allows businesses to protect their digital assets and increase the trust of users and partners, which is a key success factor in the digital economy.  

"Businesses cannot exist without trust; trust is impossible without a transparent and effective cybersecurity system. That is why technology leaders must actively shape these principles and integrate them into their products and operational processes.  

In particular, Skyhigh Security is actively developing a Zero-Trust approach to protect corporate data and access through such solutions. Our technologies use machine learning to analyze threats in real-time and help companies adapt to the rapidly changing cyber risk landscape".  

Oleg Naumenko, CEO at Hideez Group, commented:

“The modern state and availability of cloud technologies have significantly changed online services and their basic requirements”. 

“Their incredible popularity has increased the number of cyberattacks using artificial intelligence and other technologies. Providing the demand for modern online services, providers must guarantee their security and stability. Integrating various online services opens up new opportunities for improving protection and countering modern cyberattacks.  

Today, Hideez offers a passwordless authentication cloud service called Hideez Identity Cloud. It combines all online services with the possibility of a single login (Single Sign In) using modern passwordless authentication technology.  

With FIDO2 certification, we offer various authentication scenarios depending on business requirements and a specific user group. So, remote employees can use Passkey technology. Own devices, such as a phone, tablet, or laptop with a built-in biometric sensor, can completely remove the need to use passwords and even logins for all online services.  

Users in offices, warehouses, shops, or factories where one device (phone, tablet, or PC) is used for multiple users can also get passwordless authentication using a mobile phone or Hideez Key hardware security key.  

Its simple and fast integration with various online service providers makes Hideez Identity Cloud simple and affordable for small and large companies. Therefore, using innovative technology and digital security products further strengthens the popularity of online services.”  

Business awareness of online threats  

According to the Global Cybersecurity Outlook 2024 report, 90% of leaders believe urgent action is needed to address the cybersecurity disparity between companies of all sizes. Small and medium-sized enterprises (SMEs) are particularly vulnerable. They are twice as likely as large corporations to say they lack the necessary cyber resilience to secure their key operations. In addition, only 15% of organizations are optimistic about improving cyber skills and education in the next two years, indicating a severe shortage of cybersecurity experts.  

The Global Cybersecurity Outlook report also shows that 54% of companies do not clearly understand their supply chains' vulnerabilities, making them vulnerable to third-party attacks. In fact, 41% of organizations that have experienced material damage from cyberattacks said a breach by their partners caused the incident.  

Many small and medium-sized businesses still underestimate the risks associated with cyber threats. Due to the strict regulatory requirements and the specificity of their activities, the financial sector and IT companies usually have a higher level of awareness. In contrast, industries such as manufacturing or agriculture may not pay enough attention to cybersecurity.  

The main barriers are limited financial resources, lack of qualified personnel, and underestimation of potential threats. In addition, new technologies, such as generative AI, expand the possibilities for attacks, making phishing and social engineering even more sophisticated. 

The evolution of technological solutions due to the rapid development of cyber threats  

In 2025, the number of attacks using generative AI to create personalized phishing campaigns is expected to grow, significantly increasing the likelihood of successfully deceiving users. According to the World Economic Forum, although 66% of organizations expect that AI will significantly impact cyber defense in 2025, only 37% can assess the safety of AI tools before they are deployed. Moreover, according to Gartner's forecasts, more than 17% of all cyberattacks will use generative AI by 2027.  

Among the new types of cyber threats aimed at network infrastructure, the following stand out:  

  • Attacks using generative AI: Creating malicious code or phishing messages that are difficult to distinguish from legitimate ones, making them difficult to detect with traditional security tools.  
  • Evolution of ransomware: Employing more aggressive tactics, such as targeted attacks on company executives to encrypt data and publicly disclose sensitive information to undermine reputations.  
  • AI-enhanced social engineering attacks: AI analyzes large volumes of data to create highly accurate profiles of victims, allowing for more convincing and compelling attacks.  

Given these trends, companies must adapt their products and strategies to counter new threats. AI-based cyber defense solutions, in particular, can help detect and neutralize advanced attacks.  

“The number of phishing attacks based on generative AI is increasing. They aim to create personalized emails and chatbots that fool even experienced users.  

Autonomous malware is a new type of threat that uses machine learning to evade traditional signature-based antivirus systems. Another new feature is AI-optimized network attacks, which analyze traffic in real time and select the most effective ways to penetrate.  

That's why Skyhigh Secure Web Gateway integrates AI to analyze traffic and behavioral patterns, allowing you to detect anomalies before they turn into a full-blown threat. We combine AI analytics and Zero Trust principles to provide companies with high protection against even the most sophisticated attacks.” 

Signs of a secure business infrastructure   

In 2024, cyberattacks reached a record level. According to the data from State Special Communications, the number of cyber incidents in Ukraine increased by 70% compared to the previous year, reaching 4,315 attacks. Hackers' main targets have been the energy sector, government institutions, security agencies, and telecommunications infrastructure. Attackers increasingly use mass mailings of malicious software and phishing attacks to steal strategic information or destroy data.  

In 2025, the number of IoT devices will grow to more than 20 billion, creating additional vulnerabilities for corporate networks. A protected business infrastructure will guarantee the stable operation of companies in the modern digital environment.  

Oleg Naumenko, CEO at Hideez Group, mentions the key features of secured infrastructure:

“Modern business infrastructure must have three main solutions to ensure resilience against cyberattacks in 2025:  

  • SIEM (Security Information and Event Management) is a real-time system for monitoring, collecting, analyzing, and managing information security events.  
  • SSO Passwordless Authentication is a single sign-on system that supports passwordless authentication methods.  
  • Endpoint Protection is a security system that protects end devices (computers, smartphones, servers, IoT) from cyberattacks, malware, and other threats.”  

Using passwordless authentication according to the FIDO2 standard, integrating SSO solutions for single sign-on, and implementing the Zero Trust model allow you to reduce the risks of account compromise significantly.  

Solutions such as Endpoint Detection and response, intelligent DLP solutions for data protection, and user behavioral analytics will more effectively counter modern threats than classic antiviruses. These solutions allow you to detect anomalous activity, such as login attempts from unusual locations or atypical employee behavior.  

Automated solutions will allow real-time threat detection and response. SIEM systems, integration with XDR and SOAR solutions, and the use of AI for threat analysis will significantly increase response efficiency. A secure infrastructure should also include backups of critical data, as this ensures quick recovery from attacks. 

Effective methods of infrastructure protection  

“Defending against such attacks is becoming increasingly complex, but effective methods exist. Using two-factor authentication (2FA), checking email senders, being wary of suspicious links, and regular cybersecurity training help reduce risks. It is essential to be careful even with entirely normal messages because modern AI can imitate correspondence style, correct grammatical errors, and adapt to the victim's responses.   

The Hideez Identity Cloud passwordless authentication service, based on the modern FIDO2 standard, can fully ensure security against phishing attacks and generally increase the productivity of the company's personnel by removing passwords from daily use.  

FIDO technology removes the password and has an additional verification service that requests user credentials and protects each session from MITM attacks.  

A man-in-the-middle (MITM) attack is a type of cybercrime where a hacker secretly positions himself between two communicating parties, intercepting and potentially altering their data exchange without either party's knowledge, essentially eavesdropping on their conversation to steal sensitive information such as passwords, credit card details or other personal information; it's like someone eavesdropping on a phone conversation between two people without noticing it.” 

“First and foremost, businesses should implement a Zero Trust model for access control. This includes multifactor authentication, real-time user behavior monitoring, and adaptive access control.  

It is also necessary to protect corporate web traffic and cloud services. With the growing use of cloud platforms and web applications, companies should implement a Secure Web Gateway, a Cloud Access Security Broker, and Data Loss Prevention. This will help monitor web traffic, protect data from leaks, and prevent unauthorized access.  

The third step is to invest in AI, as it helps cybercriminals and cyber defense professionals, too. Businesses must also use AI analytics for real-time threat analysis, automatic anomaly detection, and rapid incident response.” 

Comments 0

Login to leave a comment