The digital world is full of opportunities for business development—and dangers that threaten not only its security but also that of its employees, partners, and clients. Companies must also comply with cybersecurity requirements. Partnering with a reliable IT solutions and services integrator is the best way for an organization to ensure smooth operations and reliable protection. Petar Dimkov, a cybersecurity expert at LIREX, talks more about current global trends in the field, the most common threats in 2024, the strengthening of regulatory measures in cybersecurity such as NIS 2 and DORA, Security Awareness training, the implementation of attack protection systems, penetration tests, and best practices for protecting business information systems.
LIREX: LATEST GENERATION CYBERSECURITY
Petar Dimkov, information security consultant, on the need of complex approach in cybersecurity
The digital world is full of opportunities for business development—and with dangers that threaten not only the organization’s security but also the safety of its employees, partners, and clients. Cybersecurity threats are growing, and so is hackers’ ingenuity. Companies also have to comply with the EU’s cybersecurity requirements. The partnership with a reliable integrator of IT solutions and services is the best way for an organization to ensure its trouble-free operations and reliable protection. LIREX is a Bulgarian company with many years of experience in the field of integrated security solutions, and the quality of its services has been proven over time with a number of successfully completed projects. Petar Dimkov, an Information Security consultant at LIREX, shares more. For 20 years now, he has been monitoring current trends in the field on a global scale and has accumulated valuable practical experience in implementing attack protection systems, penetration tests, and more.
What is the most important thing a Bulgarian company should know about cybersecurity in 2024? Which are the most common threats?
With the mass adoption of accessible and user-friendly AI techniques and technologies, 2024 will be the year when cyber threats become increasingly complex.
The use of phishing messages as attack vectors will continue, but the campaigns will be much more intelligent and sophisticated, leveraging AI technologies to deceive and mislead potential targets. We will hear more and more about the use of techniques such as deepfakes, through which hackers will be able to create a new reality for their victims, simulating familiar voices and faces to enhance the credibility of a specially crafted scam.
In 2024, ransomware threats will remain an effectively proven method of extortion for financial gain.
Also crucial for organizations in 2024 is the strengthening of regulatory measures in the field of cybersecurity, such as NIS 2 and DORA. New regulatory requirements usually come with new sanctions and fines. Therefore, organizations need to prepare in advance.
What is more important for a company’s reliable protection—trained employees or adequate systems for information security?
Both! For protection to be maximally effective, the defense of every infrastructure must be multi-layered, employing comprehensive measures—technological, organizational, and administrative. Hackers are inventive enough to employ various attack techniques. Some of these can be thwarted by increasingly advanced protection technologies, but others, which exploit the human factor as the weakest link in the security chain, can be prevented or at least minimized by enhancing the knowledge and awareness of employees (Security Awareness training). Employee awareness training promotes the cultivation of a cybersecurity culture and shared responsibility within the organization. Employees are encouraged to actively contribute to cybersecurity efforts, fostering a more resilient and conscious organizational environment.
Why is it key for organizations to not miss their regular penetration tests? How does the process take place?
No matter how many security mechanisms and controls an organization has implemented to protect its IT infrastructure, penetration testing remains the most accurate method for discovering real weaknesses and vulnerabilities in the organization’s systems. During the tests themselves, experts use their hacker mindset to simulate their attacks most effectively. This expertise is built through considerable effort and experience. Typically, the process starts with defining the scope of the tests—whether they will be directed at specific external entry points to access the infrastructure, web or mobile applications, or technological or other systems. The perspective from which the tests will be conducted is also determined—whether they will simulate an external hacker who has no access or knowledge of the tested infrastructure or an internal employee who could potentially attack the organization’s systems. After defining the scope, technical and organizational details are clarified, such as timing, communication contacts from each party, requirements, and limitations during the tests. It is best for the tests themselves to be conducted on test environments and systems—clones of real productive systems—to minimize the risks of disrupting the organization’s work and business operations. If such an environment cannot be provided, the tests are performed directly on the productive environment. The condition is to have an up-to-date archive and recovery process in case of unexpected incidents. In most cases, the tests proceed completely invisibly to the employees. Their goal is to discover weaknesses and vulnerabilities, and evidence of their legitimacy, without using active attacks that could negatively impact business processes.
What has changed with NIS 2, the updated EU cybersecurity requirements for mid-size and large companies?
The directive extends the range of regulated companies that will need to implement robust measures and standards for risk management. This entails establishing response mechanisms in the event of incidents and increasing the frequency and detail of reporting. That’s why we advise organizations to assess whether they comply with NIS 2 requirements (a so-called gap analysis) and to seek consultation on any discrepancies found with the directive by developing and implementing appropriate cybersecurity solutions.
Which are the best practices an organization can and should apply to protect itself and its partners and clients?
Modern best practices recommend two things. The first is to approach from the perspective of protecting business activities rather than specific hardware or information. The second is the necessity for information security to become a priority for the entire management of the organization, not just for the IT director or security officer.
These two key changes in the way information security is viewed within a company will naturally lead to a comprehensive (holistic) approach and significantly reduce the likelihood of underestimating or neglecting serious security risks. It will be much easier to determine priorities for the organization when thinking within the broad framework of the big picture.
How can LIREX help an organization to improve its cybersecurity?
Through a combination of bold and personalized IT solutions that cover a wide spectrum of business needs for any organization.
We consult with you. We offer options for achieving the goal, combining appropriate services and technologies. We work together with you in all phases—from the idea, through the design and development, and to the implementation and maintenance. We leverage our extensive experience, proven methods, and best practices to ensure you get the best.