top of page
  • Writer's pictureAngela Arp

Cyber Cold War - Not just clickbait

*image courtesy of

It's a genuine threat.

But what is a cyber cold war? defines a cyber cold war "as the use and targeting of computers and networks in maneuvers of war."

Today's biggest threat is the rising tensions between the US, Russia, and China — not in conventional military terms but cyberspace.

Recent global cyber security hacks are expected to have originated in Russia and China. One such hack is a "wiper" attack deployed by Moscow against Ukrainian targets on February 24. A wiper attack is a malware attack that seeks to destroy data, wiping it from systems in an effort to create chaos and cause problems in supply chains, and affects finances.

Google's Threat Analysis Group (TAG) has observed a growing number of threat actors using the Cyber Cold War as a lure in phishing and malware campaigns targeting critical infrastructure.

Since we have little control over the political nature of this threat, it's essential for companies to do what they can to protect themselves.

A company's most targetable assets are its employee access accounts. If a hacker gets ahold of just one employee login, they can get access to enough of your infrastructure to easily wreak havoc.

Think you've got your employee credentials locked down?

Think again.

Weak, stolen, or reused passwords cause 81% of breaches, so even though you may be requiring more complicated passwords, you're still vulnerable to the Cyber Cold War.

V2verfiy can mitigate this risk by protecting everything you do in the IoT with our Voice Biometric authentication ecosystem!

Remember that while it's vital for your company to build a cyberstrategy to protect your data from the Cyber Cold War, it's also essential to view your employee credentials as the weakest link.

Let's collaborate!



bottom of page