The War Is Going Cyber and Companies Are the First to Be Attacked
Dear companies, you need to protect yourselves. The warnings are strong. Attacks on European companies are increasing, and the situation in the Middle East is accelerating everything. Companies that have nothing to do with Israel or Iran are involved too: companies that manufacture components, manage logistics, provide financial services. Perfect targets, precisely because they feel far from the problem. Attacks don’t stop at the borders of the region at war. They expand, hit civilian networks, supply chains, banks in countries that have nothing to do with the conflict. It happened in previous crises and it’s happening now.
FortiGuard Labs by Fortinet are currently recording app tampering, intrusions into broadcasters, Telegram posts announcing attacks against critical infrastructure. It’s not yet a coordinated campaign. But attackers don’t wait for it to become one. Iran historically doesn’t respond immediately. It waits for attention to drop. Weeks later, when security teams have let their guard down, it strikes. The silence of these days is not a signal that the risk has passed.
European companies need to invest in ongoing training for their employees. Not a one-time course that gets forgotten. Realistic phishing simulations, regular updates, a security culture that becomes part of daily habits. A prepared employee recognizes a suspicious email before opening it. That’s why you need to run events and training continuously. You need to turn your employees into the first line of defense, not the first point of entry.
Alongside training you need basic technical measures: multi-factor authentication on VPNs and remote access, patches on all systems, segmented networks so whoever gets in through one point can’t reach everything else, backups isolated from the network, tested, ready to work when you actually need them.
Those who fix these things now will have the advantage. Those who wait for the explosion to start will arrive too late. There’s a parallel mechanism that doesn’t depend on any state actor. Geopolitical chaos is perfect cover. And the easiest target is not the firewall, it’s the person who receives the email. Most attacks come in from there: an employee who clicks on the wrong link, an attachment opened without thinking, a password reused across a personal and a company account. Not out of negligence, out of lack of preparation.
Are you doing this? Is your company doing this?
#ArtificialDecisions #MCC
