Recognize dangers, develop security strategies,
implement protective measures
The security of the IT
systems, but also the competence in dealing with them, protects against data
loss, data corruption, computer and cyber crime. Businesses should
therefore develop an appropriate security strategy that protects against
potential threats. Awareness of employees is an important safety
factor. This page provides an overview of IT security in the enterprise.
Every company should centrally
organize their security measures and perform a regular security update. Developing
a security strategy for enterprise IT is
therefore an advantage. This helps to better understand and respond to
threats to information technology and data security.
The webinar video Data Security in your own company and the processor shows
important aspects of IT security in the company and what has to be considered
in connection with the new data protection law.
The IT Security Manual for Employees helps
raise employee awareness of dangers and supports them as a training
document.
Dealing with data, data backup
The right data protection concept helps
against data loss. A regular data backup is one of the mandatory tasks. Only
in this way can data be protected against loss and damage.
The following points should be noted in the
data protection strategy:
- Scope and
classification of the data to be backed up (business and
production data, system files, databases, drives ...) - Backup
technology and media (backup tapes, removable hard drives, cloud storage,
USB flash drives, CD / DVD ...)
- Time
interval and time of backups (eg daily, weekly, weekdays)
- Number of
backups to keep in the past
- Responsible
for implementation, monitoring and documentation of the fuses
- Storage
of backup volumes
- Review of
backups, recovery tests and exercises
Hazards
Entrepreneurs should get an
overview of possible threats
from the Internet . Human error (eg accidental
deletion of data, loss of smartphone), malware, data theft and cyber crime are
the biggest security risks.
To ward off malicious software such
as viruses, worms, and Trojans, it is important to understand the
various malware infection routes and
basic protective measures . Malware attacks
can be tackled in time if you recognize the warning
signs .
Dangers also denial
of service attacks on a server, computer or other components in
a data network and targeted use of ransomware (“ransomware").
In measures to prevent the manipulation of telephone systems by phone
hacking (“phreaking") should, both the provider also seize
the company. Some safety tips against phone hackers can
reduce the risk.
Security
in networks
To protect against the dangers of
network connectivity to the Internet, anti-virus programs
and firewalls are a minimum requirement to protect computers
and networks.
Whether local area network (LAN) or
wireless LAN (WLAN): Internet connection creates dangers unless additional
protective measures are set up. For secure Internet surfing, some
encrypted connections and fully
encrypted connections are available .
Caution is advised when using wireless
networks (so-called WLAN technology). Wi-Fi networks pose
a security risk if traffic is unencrypted.
IT and data security on mobile devices
When using laptops, tablets,
smartphones, the biggest problems are in the security area. Potential
dangers arise in particular through the use
of private terminals in the company ("Bring your own
device"). The risks with mobile
phones exist above all with the release of mobile applications,
the GPS function, the data theft or device loss.
When using non-external devices, a determination
of IT security standards should be made to avoid danger and
an IT
operating agreement should be made with the employees.
For data security in the use of
mobile devices in the company the following two points should be kept:
- Ensuring password-protected access
- The regular saving of data
Information security in everyday business
Inadvertently sent spam or phishing
emails, as well as malware-infected messages can get into the Inbox folder in
daily email traffic. Social engineering ("human hacking") and social
networks are also sources of danger
in everyday working life.
In cases of phishing
attacks , spam
emails, or social
engineering , it's about getting passwords (such as PIN or
TAN), personal information, or sensitive information. Also fraud
intentions, the infection with computer viruses or the penetration into
computer networks are possible.