Ransomware attacks have been on the rise worldwide for years. Recently, four malware types have emerged that are used particularly frequently. They are responsible for more than two-thirds of all ransomware attacks and pose a major threat to both large corporations and small and medium-sized enterprises. Unfortunately, companies and organizations lack the necessary resources, especially smaller cybersecurity teams, to adequately position themselves in the fight against the aggressive hacker groups. However, effective protection is still possible with the right strategy.
Read more … The 4 most common types of ransomware: This is how dangerous they are for SMBs
Of all the dangers lurking on the Internet, botnets are considered one of the greatest threats of all. Whether in the form of a web crawler or as the sender of a spam mail - surely every user has already been confronted with robots (bots for short, derived from the English "robot"). Botnets are among the most important underground infrastructures that allow cybercriminals to access any number of infected computers simultaneously - and with an incredible variety of options. As a result, they are among the most lucrative illegal sources of income and pose an immense threat to companies and organizations. Accordingly, profit-oriented cyber organizations, syndicates and hacktivists act professionally. In this article, you will learn how botnets work and how you can best protect yourself against them.
Read more … Danger from "zombie computers" - how to protect yourself from botnets
IT security not only depends on the infrastructure and security technologies used, but also to a significant extent on the people who use the digital systems. While the security technologies used are now highly reliable, people are increasingly becoming a weak point. Cyber criminals usually look for the easiest way to obtain data or penetrate a network - and this way too often leads through uninformed, uninformed employees. Establishing a functioning culture of cybersecurity, regularly sensitizing all employees to existing threats and integrating them into the security concept as a "human firewall" is crucial for a company's overall IT security today.
Read more … Human Firewall: How to Successfully Build a Cybersecurity Culture
Deepfakes - a new threat to IT security?
by Tina Siering
Deepfakes - media content deliberately manipulated by artificial intelligence - have been known to a broad public at least since the phone call between Minister Giffey and the (alleged) interlocutor Vitali Klitschko in June 2022. Deepfakes began as a technical gimmick in the digital world and have now reached a level that has become a real threat to organizations and companies worldwide. Through machine learning and the use of AI, videos and audio files can now be faked - and in such a way that they are almost indistinguishable from genuine content. Read this article to learn about the current threats posed by deepfakes and how companies, government agencies and private individuals can protect themselves from the manipulations.
Never miss security updates again: Master patches in 10 steps
by Tina Siering
Patches that are not applied in time can become a threat to your company. Cyber criminals rely on you neglecting your patch management and applying security updates too late or not at all. There are now so many vulnerabilities in applications that many companies can no longer keep up with patching - with fatal consequences for IT security. We show you how you can close security gaps in your systems in good time and protect your company from cyber attacks with a well thought-out patch management process.
Read more … Never miss security updates again: Master patches in 10 steps
Reliable backups: How to succeed in seamless data protection
by Tina Siering
In order for your business processes to run smoothly, your digital company data must be available at all times. However, it can quickly happen that your data falls into the hands of hackers or is accidentally deleted by employees. To avoid long downtimes and loss of revenue in such cases, you should always have a complete backup copy at hand with which you can quickly restore your data. We tell you which backup methods and storage media you need to be prepared for emergencies.
Read more … Reliable backups: How to succeed in seamless data protection
New job as CIO - Tips for the first 100 days
by Tina Siering
If you have recently taken a job as a CIO (Chief Information Officer) or are thinking about offering your knowledge and skills to a new company by changing jobs: Congratulations! You have chosen an area of responsibility that will fill you to the brim. As CIO, you are not only responsible for the planning, operation and further development of IT systems, you also identify digitization trends and derive marketable business models. In this article, you'll get solid tips for a successful start in your new job.
Financial institutions are a classic target for criminals. We are familiar with the typical bank robbery by masked perpetrators in bank branches from movies or police reports. Analog robberies, e.g., on cash-in-transit vehicles, will continue to occur. But the more modern, digital version of the bank robbery is now much more rewarding for many criminals. After all, virtually all areas of our economic life have been digitally transformed in recent decades. The transformation of companies in the financial sector offers ever new gateways for digitally active attackers. The financial sector therefore considers cyber attacks to be the greatest operational risk at present.
Read more … Modern bank heists: Cybercriminals increasingly target the financial industry
Successful ransomware attacks at record levels: How to avoid becoming a victim in the first place
by Tina Siering
The risk of falling victim to a successful ransomware attack remains high. According to a recent study, two-thirds of all German companies became targets of ransomware malware in 2021 - and the threat is growing every year. As attackers come up with increasingly aggressive strategies, many companies find themselves tempted to meet the hackers' high ransom demands. In some cases, the financial implications take on drastic proportions. If you don't want to be the next victim, you should act now.
Growing cybercrime threat scenarios pose a serious risk to data security, business continuity, and corporate reputation. Extortion with encryption software continues to grow. For companies and organizations, it is a worst-case scenario with incalculable consequences if they can no longer use their IT due to ransomware attacks, their business data falls into foreign hands or production lines simply come to a standstill. On average, attackers still need six months to achieve their mission objective. An attack can be analyzed in three phases: intrusion (access to the system), propagation (spread) and endgame (mission objective) - the kill chain model.
Read more … Digital extortion: The three (killchain) phases of a ransomware attack