Tech UPTechnologyUsing WhatsApp on your work computer puts it at...

Using WhatsApp on your work computer puts it at risk

Instant messaging social networks are usually one of the most used in companies to keep work processes as efficient as possible; however, these tools can also become attack spaces that even have the possibility of affecting the entire company.

According to data from the study Infodemia and the impacts of digital life , prepared by the cybersecurity firm Kasperky and the consultancy CORPA, in Mexico two out of 10 people said they had downloaded a messaging application or program on their work teams.

Although it may seem exaggerated, this action represented a way of putting the company’s security at risk, since 44% agreed not to request prior authorization from their IT department, while 52% said they had not read the permissions of the applications or software to your installation.

This phenomenon is also known as Shadow IT and opens the door for other types of threats or attacks of greater relevance to an organization to enter, such as phishing or ransomware, through which information is lost and operations are hindered.

Rafael Escalante, a remote management and security specialist at Intel, mentions that through these vectors, hidden agents can even be integrated into a company’s equipment to do cryptojacking, which is to take advantage of computing power to carry out malicious cryptocurrency mining.

“External threats are advancing in complexity and precision,” says Brad Haczynski, vice president and general manager of global edge sales at Intel, noting that while digital transformation has advanced globally, so have ways to attack the organizations.

Shadow IT is important for cybersecurity experts, as the personal data of workers has become very popular for cybercriminals. An example of this is that last year, 41% of Latin American companies could not protect their employees’ information and faced incidents in this regard.

And it is that these software not only represent risks for the company’s computers, but also for the network environment in general, because it is not managed by the technology area and they are not usually updated satisfactorily or the downloaded version has flaws.

Teresa Patyhon, cybersecurity expert and the first female CIO of the White House, recommends that companies know the dynamics of employees with their teams, that is, know where they are, how they connect to the Internet and try to understand how they behave when they sail.

Jorge Rodríguez, specialist for client projects in government and education at Intel in Mexico and Latam, shares that companies, regardless of their size, should always look for corporate communication platforms, as they are developed and configured in a way that protects the user in case of the interference of some malicious actor.

Intel specialists also mention that companies must have protection resources inside the equipment, beyond antivirus, so that if an employee has already downloaded an application, it blocks threats if they were sent through this communication channel. communication.

Paython also adds that companies must maintain a constant evangelization approach within the company culture, in order to periodically remind themselves of cybersecurity rules and thus not expose their information to any type of malicious technological resource.

Solve with cybersecurity laws?

When talking about cybersecurity at the country level, we cannot only try to patch up the problem with a law, since it could get out of control by being steamrolled and leaving aside cross-cutting issues.

Cyberattacks grow 600% since the pandemic began

Since the start of the pandemic, when people made more pronounced use of smart devices, hacks have been on the rise.

Meet WeChat: the Chinese “super app” that competes against all the others

This application in China allows you to do everything without having to leave it. We explain what it is and how it works.

This you should consider when choosing antivirus for your computer and devices

Online threats are becoming more common and with these tips you can better protect all your devices.

How to protect yourself from apps that leak your data

Meta detected over 400 third-party apps that stole user credentials and data. Google and Apple have already removed them, but we leave you some tips to avoid falling into one of them.

More