Cyber Security Blog

Dive with us into the world of hackers, data espionage, and attack defense - several times a week for free!

The defence against cyber attacks is one of the major challenges for companies and IT security. An essential aspect that is neglected in many organisations today is early attack detection. In many situations, too much time passes before IT security detects unauthorised activities of intruders in one's own network. Time that the hackers use to get their extortion Trojans in place and launch a devastating data encryption operation.

The good news is that digitisation has now become widespread in hospitals. It is playing an increasing role in all workflows and processes, for cross-sector communication and also for telemedical applications. The bad news: At the same time, cyberattacks on healthcare facilities are becoming more frequent. IT security in hospitals is therefore playing an increasingly important role. But there is still a lack of targeted and effective implementation.

More than half of the companies surveyed in the Ivanti study suffer from a lack of staff - especially in the area of IT specialists. A representative survey by Bitkom is even more dramatic: here, seven out of ten companies state a shortage of IT specialists. For the available IT experts in the companies, this means: more work with less time. Successfully carried out cyber attacks are thus detected more slowly, insufficiently combated and at the same time phishing attacks occur more frequently. A real vicious circle is brewing on the horizon of digitalisation. What solutions are there?

Security culture is considered extremely important by experts - but 94% of respondents to the study "The Rise of Security Culture" did not agree on what the term should mean. Reason enough for us to take a closer look at the topics of "security culture in companies" and "security awareness"!

The constantly growing number of cyber attacks makes it clear that an IT security early warning system for the defence against cyber threats is becoming increasingly important. Such a system can be implemented with the help of network monitoring and anomaly detection. However, the basis for an efficient implementation is to ensure the complete control and analysis of the data.

There are a variety of cyber threats to corporate information security. Some of them are characterized by their particularly high threat potential or an insidious infection path. Other threats are difficult to detect and that is why they are so dangerous. This article looks at the five most dangerous cyber threats to network security today - and which defense techniques are effective.

On the one hand, the GDPR is intended to ensure the protection of personal data, but on the other hand, it is also intended to ensure the free movement of data within the European single market. Since its introduction in 2018, the GDPR has placed high demands on employers and employees - since then, a data protection breach can be sanctioned with high penalties. In this article, you will learn what you need to pay particular attention to as an employer when it comes to data protection in order to avoid a data breach.

For a long time, industrial controls were isolated local systems. Through further development and integration into the modern IT infrastructure, this industrial sector is now connected to networks and the Internet. Suddenly, critical ICS vulnerabilities are emerging that threaten industry and CRITIS. There is therefore an acute need to catch up in the area of industrial security - this is the conclusion of a recent study by Claroty.