Cyberpion: How to Connect your enterprise online
Companies around the world have had to re-engineer their efforts in order to become as digitally advanced as possible. From coffee breaks migrating to Microsoft Teams and meetings being held on Zoom, to increasing amounts of data being stored in cloud platforms such as Amazon Web Services, the digital ecosystem has never been more connected.
These corporate integrations have led to more sustainable and agile workflows, but they can also have a negative impact. What happens when companies run into cybersecurity breaches? The reality is that the average cost of a data breach can be about $3.86 million. According to a study published by Verizon in 2020, 45% of breaches featured hacking, 17% involved malware and 22% phishing.
It is these types of risks that motivated entrepreneur Dr. Nethanel Gelernter to study and analyze the first steps that hackers take before breaching an organization. What he found was that they were no longer targeting or conducting head-on attacks against the traditional security perimeter. As he points out: “The mindset of the hacker is to locate the easiest and most vulnerable element and leverage that to begin their attack – and this element comes in the form of the third parties to which an enterprise is connected.” And in order to protect organizations from this type of attack, Gelernter co-founded Cyberpion alongside fellow cybersecurity experts Ori Engelberg and Ran Nahmias.
Allowing organizations to connect with confidence
Cyberpion, which is based in Tel-Aviv, Israel, has developed a proactive solution that enables security teams to pre-emptively mitigate any vulnerabilities in a company that could be exploited by a digital threat. Nahmias, Cyberpion’s co-founder and Chief Business Officer, says that “in the era of COVID-19, the transition to conducting business digitally or with zero-touch has only accelerated and expanded the need for organizations to implement third-party solutions.” As more companies leverage these third-party vendor solutions to enrich their online market presence, improve operations and serve customers, they are becoming more susceptible to cyber threats every day.
Companies should bear in mind that all of the partners they are connecting to have their own IT infrastructure, which is in turn connected to even more complex systems: this is where hackers take advantage. Rather than attacking head-on, hackers threaten an enterprise’s secure data by exploiting the vulnerabilities from these third-party vendors.