Following a cyberattack, a mid-sized automotive supplier completely shut down all its IT systems. The result: production came to a standstill; the damage amounted to more than twelve million euros. An isolated incident? Far from it. According to a Hiscox study, 43 percent of firms have been victim to at least one cyberattack in the last twelve months. But what are the key points to consider if you want to remedy vulnerabilities and comprehensively protect users, IT, and intellectual property against attacks?
According to the country's Federal Office for Information and Security (BSI), more than 117 million new pieces of malware were detected in 2020 in Germany alone. The peak amounted to some 470,000 threats in a single day. These affected companies of all sizes across a range of sectors, particularly mid-sized operations. And, according to the BSI, something else has changed, too: While untargeted mass attacks on random targets were previously favored by hackers, attacks on IT environments have since become increasingly more precise and intelligent. The most popular attacks use phishing and ransomware, with the aim of acquiring client data and intellectual property or encrypting sensitive data, in order to extort sizable ransoms from targets.
The key to successful cyber defense is a holistic strategy for IT security, which looks beyond firewalls and virus scanners. The first task is to ensure endpoint security, such as for clients and servers. Secure email communication, protected internet access, and continuous management of vulnerabilities are all essential for rooting out and remedying potential security gaps within internal IT infrastructure. All of this is made possible with the Magenta Security Shield. In real time, T-Systems analyzes all network connections, processes, or patterns of behavior in the Security Operations Center (SOC) and informs the client about suspicious incidents or unusual user behavior. If the risk of a threat becomes apparent, or should a security incident occur, the experts will put a stop to all processes and remove the attacker from the system.
Vulnerability management is an important building block for any security strategy. Vulnerability scans identify gaps in security early on, enabling threats to be dealt with proactively.
Christopher Ehmsen, Head of Portfolio Management & Solution Sales Cybersecurity, T-Systems Austria