The cold facts
Technology is involved in every aspect of daily life, thereby having an effect on core areas such as the supply of energy and water, as well as the healthcare and food industries. There is virtually no part of our life that remains untouched by technology or is not digitally connected. Technology is finding its way into our working and personal lives to an ever-greater extent – at the same time, this technology is becoming increasingly complex and thus more susceptible to attacks and tampering. The larger and more complex the infrastructure, the more vulnerable companies are.
Cyber attacks and data theft/fraud have been among the Top 10 Risks listed by the World Economic Forum for years, both in terms of the likelihood of them occurring and the extensive, damaging effects they can have. According to a survey conducted by the German digital association Bitkom, 3 out of every 4 companies have fallen victim to acts of sabotage, data theft or espionage, causing a total of 102.9 billion euros of annual damage to the German economy. Thanks to our specially developed cybersecurity detection technology we observe this dramatic increase every day in our Cyber Defense Center (CDC) in Vienna. New challenges are determined and therefore our threat intelligence never sleeps.
What cybersecurity professionals need to know
Recommendations
Block access doors
Know your devices
Securing connections to data centers and cloud storage is vital as a growing number of devices and applications are in circulation. No longer needed or damaged devices should be disposed properly.
Define use cases
Security requires values and indicators of an infrastructure’s typical behavior. Use cases serve as a documentation of typical system operations. They help to detect anomalies.
Follow law and order
In many sectors such as critical infrastructure, companies are obliged by law to prove a comprehensive security concept and demonstrate effective measures.
Table of content
2019: Looking back to move forward
New challenges
Radar Cyber Security Outlook 2020
Cybersecurity checklist
Build or buy? Radar Managed Services vs. Radar Platform