- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
In the past year, companies have taken a giant step on their digitization roadmap. Cybercriminals have adapted to the realities. This is how you can protect your company from attacks.
The year 2020 gave German companies a strong boost in digitization and at the same time demonstrated how flexibly cybercriminals react to current topics and trends. While companies quickly moved their employees to the home office and established digital processes, the attackers also adapted their methods to the new circumstances. The corona pandemic and the associated IT risks will continue to shape day-to-day business this year. Companies can strengthen their digital defenses with the following measures:
Tip 1: Network Segmentation
Ransomware remains the number one threat and attacks have soared during the pandemic. According to the current IT security report from the BSI, the situation was dominated by the Emotet malware, as in the previous year. It enables the malware to spread cascade within a network and gradually infects all existing systems to then encrypt the data and extort a ransom. "One protective measure against this threat is network segmentation," says Raphael Vallazza, CEO of the security specialist Endian. “Just as bulkheads divide a ship into several segments to keep it seaworthy in the event of a leak, several network segments also prevent the unchecked spread of malware. “The use of IoT gateways is ideal for fast and efficient segmentation of the networks. By placing them in front of the individual segments, no changes to the network structure are necessary. Also, modern gateways are equipped with several security functions that can ward off a wide variety of threats.
Tip 2: Secure Authorization
The advancing digitization and more employees in the home office are causing a growing fragmentation of the IT landscapes in companies. More and more external devices and users are demanding stable access to central company resources. IT administrators, therefore, need a central tool with which they can manage all access rights. This allows granular rights and authorizations to be granted and revoked in real-time for individual users or user groups. Also, regulations are helpful that define where and when access is permitted, for example during normal business hours and from the home office or the employee's workplace. For example, access from a country in which the company does not have a branch can be prevented.
Tip 3: Two-factor Authentication
Insecure passwords still represent a major security risk. If you take a look at the top twenty list of German passwords (Hasso Plattner Institute), you will quickly recognize the extent of the problem: The simple series of numbers 123456 has been in first place for years, followed by 123456789, password, and similar simple combinations that an automated brute force attack can decipher in seconds. Against the background of the home office trend, companies should therefore go one step further and use two-factor authentication for remote access for their employees. Another factor is integrated into the registration process, which represents an additional barrier for attackers. The most common is the “ownership component”, in which the user has to own a certain device, for example, his smartphone, to which a temporary password is sent.
Tip 4: Certificates for M2m Communication
In the Internet of Things (IoT) and in the Industry 4.0 environment, more and more devices are networked and communicate with each other. As with their employees, companies must also ensure that machines only access their systems if they are authorized to do so. Against this background, certificates are gaining in importance because they ensure secure machine-to-machine communication (M2M). They give every device and every machine a unique identity with which they can identify themselves to other machines, systems, and people. Certificates are also used to encrypt communication so that data cannot be stolen or manipulated, for example when transmitted to a central IoT platform.
Tip 5: Sensitize Employees
Attackers keep relying on human vulnerability and simply send their malware by email. Home office, insecurity, and constantly changing requirements for combating the pandemic make so-called phishing attacks even more successful. For example, emails are sent that allegedly contain important information about the currently applicable regulations or economic assistance. As soon as the recipient clicks on a link or attachment that has been sent, malware is installed. Social engineering attacks have also increased. Cybercriminals contact employees in a targeted manner to get sensitive information or to get them to send money. The employees in the home office do not have the opportunity to coordinate with a colleague quickly and are therefore even more vulnerable to attack. Companies should therefore sensitize their employees to the various risks and develop appropriate recommendations for action.
Tip 6: Visualize Networks
Networks are becoming increasingly complex. With the help of network visualization, administrators keep an overview. A graphic representation makes it easy to understand which sensors, devices, and people communicate with each other within the company network and which systems they are in contact with across company boundaries. Such a visualization forms the basis for the network segmentation described at the beginning. In transparent networks, suspicious behavior and anomalies in communication can also be quickly discovered. This allows companies to expose cyber attacks even before major damage occurs.
Find the best antivirus software to enhance your IT security
Tip 7: Business Continuity Management
No measure guarantees one hundred percent protection against cyber attacks. Companies must be aware that there is always a residual risk, even with careful precautions. Cybercrime has become a lucrative and constantly growing business in the networked world. Attackers know how to use weak points and current trends for themselves and are often one step ahead of the company. It is therefore advisable to develop an IT emergency plan that ensures business operations can continue in the event of an emergency.
- Get link
- X
- Other Apps
Comments
Post a Comment