Cyber Security Blog

Dive with us into the world of hackers, data espionage, and attack defense - several times a week for free!

The damage caused by ransomware worldwide in 2021 amounts to around 20 billion US dollars. This is an increase of around 5,700% compared to 2015 - and the trend is still rising. Companies that do not take care of the necessary in-house IT security in good time therefore run the risk of falling victim to these attacks sooner or later and, in the worst case, suffering losses in the millions. The attackers do not "discriminate": public institutions are attacked just as much as privately managed companies or companies listed on the stock exchange. Virtually every sector is affected, from skilled trades and industry to the financial and technology sectors.

A recent study shows: Attacks on the software supply chain are particularly lucrative for cybercriminals. A single hack within the supply chain is enough to infect several thousand companies with malware in one go. So it's no wonder that the criminal business with attacks on software components is booming - not least because supply chain security is often neglected. It would be very easy to close the security gaps with innovative solutions.

Cyber criminals have no industry boundaries. Even companies with a good IT security department can be affected by a cyber attack. What to do if it is successful? Experts use the term "incident response readiness" to summarize how to react appropriately in an emergency. Our article contains important first aid measures. It also shows how you can prepare your company to keep damage to a minimum in the event of a hacker attack. After all, a long-term and well thought-out strategy against cyber attacks pays off for all company stakeholders.

Cyber security experts are loners who sit in front of their computers all day in hoodies in darkened rooms, hacking lines of code upon lines of code into the keyboard, have no social life (and don't want one either) - the common opinion about working in cyber security teams is full of prejudices. The cliché from Hollywood movies, however, has little to do with reality.

In the course of digitalization, even small and medium-sized enterprises have to process more and more information and data. The data is elementarily important for maintaining operational processes. New technologies, for example the Internet of Things (IoT), as well as the globalization of the entire economy are making the network of digital services ever more closely meshed. The more sensitive and critical a company's own data is, the greater the need for protection. Current security analyses show that companies worldwide are at permanent risk of falling victim to cyber attacks. Particularly critical data must be adequately and continuously protected against cybercrime, such as sabotage, espionage and loss, in accordance with the EU Data Protection Regulation. In the event of a compromise, there is a risk of financial damage as well as loss of reputation. In addition, managing directors of a limited liability company can be held liable in the event of damage if they have not adequately secured their systems - in some cases, this can result in severe fines!  In this context, penetration tests enable the rapid detection and elimination of IT and information security vulnerabilities that could result in a loss of personal data as defined by the EU GDPR. In this article, you will learn which pentesting methods are particularly suitable for medium-sized businesses and which of them is the right one for your company.

Due to the war in Ukraine, secion provides an assessment of the threat situation for companies and examines the question of whether increased Russian attacks on companies in Germany, Austria and Switzerland can be identified. There is currently no evidence of an acute increase in the threat posed by Russian state actors in Western Europe, but there is increased public awareness of these cyberattacks. In addition, "third-party actors" are creating a new dynamic.

More than half of the companies surveyed in the Ivanti study suffer from a lack of staff - especially in the area of IT specialists. A representative survey by Bitkom is even more dramatic: here, seven out of ten companies state a shortage of IT specialists. For the available IT experts in the companies, this means: more work with less time. Successfully carried out cyber attacks are thus detected more slowly, insufficiently combated and at the same time phishing attacks occur more frequently. A real vicious circle is brewing on the horizon of digitalisation. What solutions are there?

The constantly growing number of cyber attacks makes it clear that an IT security early warning system for the defence against cyber threats is becoming increasingly important. Such a system can be implemented with the help of network monitoring and anomaly detection. However, the basis for an efficient implementation is to ensure the complete control and analysis of the data.

There are a variety of cyber threats to corporate information security. Some of them are characterized by their particularly high threat potential or an insidious infection path. Other threats are difficult to detect and that is why they are so dangerous. This article looks at the five most dangerous cyber threats to network security today - and which defense techniques are effective.