Cybersecurity: new configurations

From large-scale personal data leaks to cyberattacks against states or major businesses, cybersecurity is more than ever central to the digital challenges faced.

The widespread adoption of technologies and rapid growth in the volume of data circulating are increasing the opportunities for cybercriminals and making organizations porous to cyber threats. With Orange Cyberdefense, the Group ensures the IT security of businesses and organizations. More generally, Orange builds its customers' awareness of best practices for protecting their personal data.

History of the 21st century's cybercrimes

Asymmetrical cyberattacks
The profiles of attackers are extremely varied, considering that any individual could potentially attack a major business today without needing to have a lot of resources. A whole range of cyberattack tools are available on the dark web's search engines, with “crime as a service” offers available to anyone. Any business, whatever its size or activity, could potentially be concerned simply because its infrastructures are not secure enough. When hackers have found a procedure that works, they seek to exploit it by looking for all organizations with the same IT flaw, which explains why several firms from a particular sector may be attacked over a short period.
This may be:

  • a targeted action against a business or institution when they are solvent or the attacker has a financial backer,
  • a circumstantial attack after detecting a flaw on a piece of equipment.

Four levels of attacks can be seen in the history of cybercrime:

  • stealing information as discreetly as possible,
  • altering work or data,
  • destroying documents or making them inaccessible,
  • putting a system out of action.