Six Recommendations for Cyber Attack Protection in 2023Six Recommendations for Cyber Attack Protection in 2023

Lumu Technologies, the security technology company that created the Continuous Compromise Assessment™ model, which allows organizations to measure confirmed compromises in real time, has listed a series of recommendations for people to act safely when they have any kind of contact with the network.

Germán Patiño, Lumu Technologies’ vice president of sales for Latin America, points out that in a hyper-connected world, people are increasingly using the Internet to solve their daily needs. “The technology allows the user to perform different tasks and connect to various sites from a mobile device or a personal computer. The preventive behavior of the user in each of these actions will define the limit of access for attackers, so cybersecurity should always be a primary issue for people,” explains the executive.

The main types of cyber-attacks that common users are exposed to on a daily basis are: phishing/smishing (malicious email and text messages); social engineering; information hijacking; fraud; impersonation, and cyberbullying.

To avoid these and other types of attacks, Lumu Technologies recommends following six tips:

- Minimize the personal information that is exposed on social networks.

- Keep your computer and mobile device with the latest system updates.

- Activate antivirus and firewall on personal and family computers.
Think twice before clicking on a link.

- Use strong passwords, but above all enable multi-factor authentication (MFA) whenever it is available on computers.

- Share cyber security tips with family and friends. 

If a possible breach is suspected, the cybersecurity specialist company recommends acting as follows:

- Immediately block access to all financial products.

- Change the Internet password if you suspect that outsiders are connected to the network.

- As soon as there is any kind of suspicion, identify the possible compromised services and make preventive changes to passwords.

- Review with the cellular and Internet service provider the recovery of the account.

- Report to the appropriate authorities and report it, this helps prevent others from becoming victims.

- Create and strengthen the response plan to a possible attack, in order to acquire a preventive behavior to the risks generated by the presence on the Internet. 

“Just as we take care of our relationship with the environment, having a circle of trust on the net is essential to understand how we interact with them: self, family, friends, colleagues, acquaintances and finally strangers are the information access filters that we should apply to our presence on the internet. Cybersecurity is a complex task, but it doesn’t have to be that way; there is an efficient way to operate it, and the first step is to identify how the adversary enters the network to take the appropriate measures in order to close the detection gap,” Patiño concludes.

Lumu Technologies

Headquartered in Miami, Florida, Lumu is a cybersecurity company focused on helping enterprise organizations identify threats and isolate confirmed instances of compromise. By implementing the principles of Continuous Compromise Assessment™, Lumu has built a powerful feedback and self-learning solution that helps security teams accelerate detection of confirmed compromises, gain real-time visibility across the infrastructure, and close the security breach detection gap from months to minutes. Learn more about how Lumu identifies network compromise points at

*** Translated with by DEFCONPress FYI Team ***

By admin