Success stories

Critical
_
infrastructure
_
cybersecurity
_
with
_
Sofistic

Cybersecurity

The professional safeguarding IT systems and information management is essential to protect vital transportation, banking, energy and healthcare services from possible cyber-attacks. El Dorado airport and the electricity company ENSA rely on Sofistic’s solutions.

Critical infrastructures

Transportation, health, basic supplies, telecommunications, banks, strategic industries and public administrations are just a few of the critical infrastructure companies that have placed their trust in Sofistic Cibersecurity, Cuatroochenta's cybersecurity unit, to protect and shield their facilities and services from cyberattacks. Our client list includes OPAIN, the company in charge of the management of Bogotá's El Dorado, the second largest airport in South America with 34.9 million passengers, and the electric power distribution company ENSA, based in Panama with more than 470,000 clients.

Inicio del proyecto: 2017

Challenges

01 Protect strategic infrastructures that provide essential services and are highly attractive to cybercriminals from potential cyberattacks.

02 Simplify and centralize cybersecurity management.

03 Avoid the risks of outdated systems and obsolete devices.

04 Addressing growing vulnerabilities and threats from the expanding Internet of Things (IoT) ecosystem.

05 Managing large numbers of passwords that may be exposed.

06 Protecting websites, online services and teleworking applications.

07 Avoiding human error. Some reports indicate that 7 out of 10 security incidents are caused by human error.

Solutions

01 Customized assessment of the company's system to detect vulnerabilities and implement appropriate corrective and preventive measures.

02 24/7 monitoring through the Atlantis SOC, the Security Operations Center (SOC), with a response time to critical incidents of less than 2 hours. It is distributed over two continents to operate uninterruptedly and prepared for meteorological risks, catastrophes or massive attacks.

03 Advanced cyber defense system supported by artificial intelligence and machine learning with Darktrace to detect, through behavioral patterns, and combat threats in real time. It can analyze up to 1,000,000 connected devices in the enterprise.

04 Protect endpoints or end devices with the most advanced tools, such as CrowdStrike. It replaces conventional signature-based antivirus with this EDR capable of detecting even unseen threats, thanks to the analysis of behaviors through artificial intelligence and machine learning.

05 Monitoring password theft through Big Data.

06 WiFi network audits, security audits with protected authentication systems, encrypted connections from any location, evaluation of device encryption or intrusion detection system. Services especially useful for teleworking environments.

07 Specific training to teach workers how to act in the event of an incident or suspicion. The recent hacking attempt at a water treatment plant in Florida is an example of how employees can raise the alarm and stop an attack in its tracks.

Financial and tax services, energy and transportation services account for half of the cybersecurity incidents of very high or critical danger, according to data from the National Cryptologic Center (Spain).

Although cyber-attacks on essential infrastructures are not the most numerous, they have the greatest impact, as they can jeopardize the continuity of an essential service such as a hospital, an airport or a water treatment plant, affecting the safety, health or welfare of citizens.

From Sofistic, engineers specialized in new technologies and computer forensics are responsible for conducting security audits to detect what are the vulnerabilities of the information system of the infrastructure and thus adopt the tools and specific corrective and security measures. To turn these companies into strengths, it is key to integrate artificial intelligence and machine learning into cybersecurity. These advanced systems are capable of detecting new viruses and other types of malwares that are not yet registered in traditional antivirus signature databases.

All these solutions, moreover, come with advanced Microsoft 365 support that, by applying optimal cybersecurity configurations, enables system monitoring, identifying personal data security breaches, disaster recovery and notifying those breaches to the data protection authority and customers.

With the pandemic, cybercriminals seek to maximize damage and make financial gains by attacking critical infrastructures such as hospitals.

Main risks of critical infrastructures:

Access to internal control systems

Service interruption

Breach of data integrity and confidentiality

Denial of service

Economic losses

How to secure a critical infrastructure?

Segment networks

This way the most critical environments are less exposed to the outside world.

Update devices

Contacting the manufacturer to see if there are patches or software updates.

Adopt new protection systems

Equipped with artificial intelligence and machine learning to gain detection and reaction capacity.

Update and establish more restrictive security policies.

Adapt them to changes in your architecture.

Contemplate the risk of third parties

Implement technical and contractual controls with the companies that provide you with services, suppliers and even the workers themselves.

 “Cybersecurity should not be seen as an expense, but as an investment”

Results

Incident reduction.
Incident reduction.
Real-time control and monitoring.
In 99% of the systems analyzed, some type of vulnerability has been found.

Cyber-attacks have become more sophisticated and increasingly targeted. All this, added to the fact that exposure to risk has increased due to the expansion of teleworking and the Internet of Things, makes it essential to have a cybersecurity monitoring, auditing and prevention service.

Want to learn more about Sofistic's services?

Contact our specialists