The Next Breach Will Target Identity, Not Firewalls
Teams leading security in 500–5,000 employee companies across LATAM must look beyond malware and traditional intrusion attempts.
The primary threat is increasingly identity-based access—across users, devices, messaging platforms, mobile endpoints, and remote access systems.
Identity rarely fails loudly.
It fails quietly, inside normal workflows.
Meanwhile, incident pressure in the region continues to rise. The World Bank has identified Latin America and the Caribbean as the world’s fastest-growing region for disclosed cyber incidents, citing an average annual growth rate of roughly 25% since 2014. (World Bank Blogs)
But volume isn’t the real shift.
The shift is how attackers enter.
- A login that looks normal.
- A session token that still works.
- A password reset that should have triggered verification — but didn’t.
- A contractor account that never got deprovisioned.
The initial stages may appear routine, which is why these attacks often succeed.
The primary risk for mid-market companies is not weak security, but operational realities.
Large enterprises can afford specialization, segment teams, isolate environments, and implement multi-layer governance. Mid-market companies typically cannot operate this way.
Mid-market companies often rely on exceptions.
The contractor needs access today.
Operation's needs “just this once” admin rights to fix something in production.
Finance needs to sign a bank transaction from a phone, right now.
If the CEO is traveling and unable to complete multi-factor authentication, another individual may intervene to assist.
These actions do not feel negligent in the moment; they are perceived as necessary to maintain business operations.
Attackers do not need to bypass your strongest controls. They only need to exploit a single instance where business needs required a shortcut and security lacked a scalable, safe solution.
If you want a reality check, incident responders consistently see high-impact attacks start with access paths such as credential abuse and remote access exploitation. Mandiant’s incident response data shows ransomware as a major portion of engagements and ties many intrusions to access-based vectors (credential abuse, brute-force attacks, and exploited edge devices).
It is not necessary to focus on specific categories; instead, it is important to recognize the underlying pattern:
Attackers are increasingly logging in instead of breaking in.
“How work happens” in LATAM increases identity risk.
Many security analyses overlook this point. LATAM is not unique due to cultural factors; rather, it is driven by the operational mechanics of mid-market companies, which expand the identity attack surface.
In many LATAM mid-market companies, messaging platforms aren’t just communication tools. They are operational infrastructure. Customer issues, vendor coordination, internal approvals, and urgent financial requests move through these channels. When work lives inside messaging, identity tied to messaging becomes production access — and attackers follow production access.
Security implication: attackers follow business workflows. If work is conducted through messaging, then malicious files, fraudulent invoices, and account takeover attempts will also occur there, as these channels are trusted and efficient.
Trend Micro documented an enterprise-targeting campaign in Brazil that spreads via WhatsApp via ZIP attachments; when executed, it establishes persistence and hijacks WhatsApp sessions to propagate to contacts and groups. (www.trendmicro.com)
That’s not a niche curiosity—that’s a preview of how “normal” channels become breach channels.
Second, LATAM is mobile-first in practice, which pushes identity beyond the neat perimeter of managed laptops. GSMA Intelligence reports that mobile internet access in the region nearly doubled from 2014 to 2021 (from ~230M to ~400M), while a large population still lacks access—meaning usage patterns and device contexts remain highly variable. (GSMA Intelligence)
Security implications: credentials and sessions frequently move across personal devices, unmanaged endpoints, and variable networks.
Third, hybrid work is not optional. A JLL study reported 72% of companies in Latin America opt for a flexible work model. (JLL)
Security implications: remote access paths are always open, and “temporary” exceptions become permanent features of the architecture.
Finally, the region’s cybersecurity maturity is improving, but unevenly. The OAS–IDB reporting and the underlying 2025 cybersecurity maturity study emphasize progress alongside persistent gaps across countries. (OAS)
Security implication: Inconsistency becomes the norm—especially for companies operating across multiple countries, business units, and providers. Attackers only need one inconsistent gate.
In practical terms, LATAM work patterns increase identity risk in the following ways:
The fastest workflows often bypass the slowest controls.
The strategic shift for 2026: stop treating identity as a monitoring problem.
Most mid-market security programs focus on detection, which is understandable given the availability of detection solutions.
But credential-led intrusions change the math.
When an attacker uses valid credentials, early signals are weak. Activity can resemble legitimate administration. Native tools can be abused without dropping obvious malware. The security question stops being:
“Is this malicious?”
and becomes:
“Was this access ever supposed to be possible?”
Microsoft’s Digital Defense Report highlights Latin America as a region frequently targeted by cybercriminals and points to credential theft, phishing, and ransomware as common threats—explicitly calling credential theft a leading concern tied to frequent infostealer infections. (Microsoft CDN)
If credential theft is prevalent, the effective strategy is not to rely on the assumption that credentials remain confidential.
It’s:
Make stolen credentials insufficient to create meaningful access.
This requires governance, not just monitoring.
The three identity failures behind most mid-market incidents
In practice, most credential-driven incidents collapse into three categories of failure. Not 40. Three.
1st: inconsistent authentication enforcement.
MFA exists—somewhere. But it’s not meaningfully enforced everywhere. Email has it. VPN doesn’t. Employees have it. Contractors don’t. Certain SaaS apps have it. The “weird” ones don’t. Attackers don’t fight your best gate; they find your weakest.
2nd: persistent privilege.
Local administrative privileges often remain on endpoints due to operational needs. Cloud roles may remain broad for efficiency, and temporary escalations are not always revoked due to a lack of ownership. Stolen credentials can therefore provide elevated access.
3rd: fragmented lifecycle management.
Offboarding is incomplete. Contractor access lingers. Old accounts remain active “just in case.” Service accounts and API tokens rarely receive the same level of governance as humans. Manual processes cannot keep up with mid-market velocity.
Addressing these three issues at scale significantly reduces the probability of breaches without requiring a substantial increase in staffing.
For lean teams in 2026, identity should be managed with the same rigor as infrastructure.
This is the opinion I’ll stand behind:
For LATAM mid-market companies, identity is no longer an IT service. It’s production infrastructure.
Infrastructure is governed by standards, assigned ownership, change control processes, and measurable reliability. It avoids ad hoc exceptions, as these can lead to outages.
Identity needs the same discipline.
Identity-as-infrastructure isn’t “buy IAM.” It’s designing the environment so the business can move fast without creating new doors every week.
This approach should deliver four key outcomes, rather than just a list of features:
One source of truth.
There should be no conflicting directories or shadow user stores across tools. All users, groups, and access logic should be managed in a single authoritative system.
Universal strong authentication (where it matters).
Strong authentication must be enforced for all critical access paths, including email, SSO, remote access, administrative portals, and high-value SaaS applications.
Device-aware access.
Passwords and tokens alone should not grant access. If a device is unmanaged or non-compliant, access must be restricted.
Automated lifecycle.
Joiner/mover/leaver must be automatic across systems. Manual offboarding is where orphaned access is born.
This is exactly why consolidation platforms matter in the mid-market. You don’t have the staffing to stitch five identity products into one coherent policy machine.
For example, JumpCloud’s documentation describes conditional access policies that can deny access when users are on unmanaged devices or unapproved networks—turning “policy intent” into enforceable access behavior. (JumpCloud)
Whether you choose JumpCloud or another approach, the architectural goal is the same: reduce identity fragmentation to ensure consistent enforcement.
A more effective test for 2026 is whether credential theft can be rendered inconsequential.
Here’s the practical question I’d put in front of every LATAM mid-market leadership team:
If an attacker steals one credential in your company, do they immediately win?
Or do they hit friction?
If MFA is enforced consistently, a password alone doesn’t work.
If device trust is required, a stolen session from an unmanaged endpoint won’t travel far.
If privilege is minimized, a compromised user can’t quietly become an admin.
If the lifecycle is automated, ex-employees and rotating contractors stop being persistent doors.
The goal isn’t “no credentials ever leak.” In a region where infostealers and social engineering are persistent, that’s not a serious strategy. (Microsoft CDN)
The goal is: stolen credentials don’t automatically become compromised.
Achieving this outcome increases the cost to attackers of breaching your company, which is essential for lean teams.
Communicating with leadership: focus on operational risk, not theatrics
Most mid-market leadership teams are not interested in threat details; they seek a reduction in operational risk.
So, the 2026 narrative should be simple:
“Our highest-probability breach path is credential-based access. We’re centralizing identity governance across users, devices, and access paths so stolen credentials don’t equal compromise.”
Then measure what matters:
- MFA coverage across primary access paths
- percentage of endpoints that are managed/compliant
- persistent admin exposure (where it exists and why)
- time-to-deprovision across critical systems
- privileged account and service account review coverage
This is a business-focused narrative, rather than a purely security-focused one.
Bottom line
LATAM mid-market companies aren’t behind. They’re operating in a more challenging environment: rising incident volume, mobile-first workflows, messaging-heavy operations, hybrid work, and uneven maturity—with lean teams expected to keep it all together. (World Bank Blogs)
The key question for 2026 is not whether more tools are needed.
It’s:
Do we control identity everywhere that matters—consistently, automatically, and with device-aware enforcement?
Attackers no longer need to break in using traditional methods.
They log in.
And the companies that treat identity like infrastructure will be the ones that turn that login into a dead end.
References
- World Bank Blogs. “Beyond just IT: cybersecurity as a foundation for economic growth.” (Jan 6, 2026). (World Bank Blogs)
- World Bank. Cybersecurity Economics for Latin America and the Caribbean (report document page and excerpted findings on incidents 2014–2023). (World Bank)
- Meta & Boston Consulting Group. Perspectives on Business Messaging in Mexico (2024; survey of 400 businesses).
- Trend Micro Research. “Self-Propagating Malware Spreading Via WhatsApp, Targets Brazilian Users.” (Oct 2025). (www.trendmicro.com)
- JLL. “Hybrid work predominates in Latin America…” (Apr 30, 2024). (JLL)
- OAS. Press release on the 2025 OAS–IDB Cybersecurity Report. (Dec 18, 2025). (OAS)
- Inter-American Development Bank. “Cybersecurity Maturity Improves in Latin America and Caribbean…” (Dec 18, 2025). (Inter-American Development Bank)
- IDB Publications. 2025 Cybersecurity Report: Vulnerability and Maturity Challenges… (Dec 2025). (IADB Publications)
- Microsoft. Microsoft Digital Defense Report 2025 (PDF and overview page). (Microsoft CDN)
- JumpCloud Support Documentation. “Get Started: Conditional Access Policies.” (JumpCloud)