The existence of many different cyber threats, and the difficulty in preventing them
What makes responding to these attacks difficult? In our case, when we have investigated the situation thoroughly, in a group, for example, we find that more than 10 back doors exist in the infrastructure. And if a particular area gets hit by malicious software, then you can be sure that the attacker will have left 10 entry points for themselves, — Igor Lyapunov, Vice President for Information Security, Rostelecom.
When it comes to critical information infrastructure, one of the main entry points is via IT contractors, IT companies, which develop and maintain the IT infrastructure in question, — Igor Lyapunov, Vice President for Information Security, Rostelecom.
If we talk about professional, targeted, slow [attacks, Ed.] <...> we may not stop one from happening, but we will notice it. <...> There are technologies and methods in place to catch it. Unfortunately, in order to make a company safe from these kinds of attacks, you not only need technologies and products, you also need to integrate them, train personnel, and conduct periodical audits. Today, if we speak about Russia, there is neither a single company nor a single integrator that offers this, — Eugene Kaspersky, Chief Executive Officer, Kaspersky Lab.