The risk of cyberattacks has increased since the coronavirus pandemic: The EY Data Theft Study 2021 shows that companies are becoming increasingly aware of the digital threats they are exposed to and that comprehensive protection mechanisms are needed to reliably protect data. 63% of the study participants surveyed already consider the risk of becoming the target of cyberattacks to be high. Find out why data theft is worthwhile for hackers and how companies can protect themselves against unauthorised access.
The term data theft describes access to secret and sensitive data from companies, organisations or private individuals using illegal methods. Cyber criminals use various methods to steal confidential content and use it for their own purposes. The effects of data theft can cause far-reaching damage to companies: For example, a hacker attack on a well-known e-bike manufacturer in January this year led to a complete shutdown of operations for several weeks and the company ultimately had to file for insolvency. It is therefore important to take early and continuous security measures to protect against data theft.
Data leaks can occur in different ways, for example due to faulty software or external influences on a system landscape - such as a cyberattack. Data in systems that are actually protected can be accessed via the resulting security gaps, regardless of whether they are self-inflicted or externally caused. Cyber criminals can then use this for their own purposes.
Phishing is a well-known but still very popular method. It involves sending emails, text messages (the appropriate term for this is smishing) or WhatsApp messages that are disguised as legitimate and encourage the recipient to click on a link. In this way, the attackers attempt to elicit personal login details or information from the recipients. For example, a phishing message may contain information about an alleged hacker attack that requires the user name and password to be re-entered. If those affected follow this request, attackers can easily inject spyware or other malware into the computer system. Data can thus be sabotaged or business processes spied on.
Malware is the umbrella term for various types of malicious software. These include viruses, Trojans, ransomware and spyware that spy on and pass on company information, causing major damage to company networks. The number of ransomware attacks in Europe in particular is set to rise, according to the Mandiant Cyber Security Forecast 2023 the number of ransomware attacks in Europe in particular will increase enormously in the coming year, resulting in even more victims of data theft.
Keyloggers are a particularly sophisticated type of malware, as the software is able to record keystrokes on digital end devices. If users enter their personal login details or send messages containing confidential information, the keylogger records them and makes the content visible to cyber criminals.
In order to gain access to protected data such as user names and passwords, the fraudsters first establish an apparent relationship of trust with the victims. This increases the likelihood that sensitive information will be entrusted to them. In social engineering attacks on companies, for example, they ask about the management's attendance times, which employees are authorised to make transfers or which business activities are currently pending. To protect themselves, it is important that employees are alert to such requests, ask questions and do not allow themselves to be intimidated.
It is not only companies that are benefiting from increasing digitalisation and the associated technological possibilities. Cyber criminals are developing ever more sophisticated methods and scams to obtain information. With the so-called MFA fatigue tactic, for example, it is possible to crack multi-factor authentication (MFA). To do this, the attackers must first obtain the user's username and password. They usually use social engineering tactics and overwhelm the victims with password requests until they reveal their data. The hackers then log in with the data, whereupon an authentication request is sent to the user.
In everyday life and due to the previous flood of requests, they often tend to confirm the request - and the hacker attack was successful. Recognising such attacks is simple in principle: if the user data was entered in a login portal not moments before, the authentication request is often not genuine. But in everyday life, people quickly become unaware of why this tactic is so successful. Companies should therefore take precautions for such cases and also sensitise their employees to the issue of data theft and point out current scams.
The consequences of data theft can be devastating. Identity theft, blackmail attempts and loss of trust are a long-term problem for companies. If sensitive customer data is lost, published or used for spam, companies lose their good reputation. In the case of company secrets that should not be made public, hackers often attempt to blackmail them. If the data theft is self-inflicted, for example if security measures are neglected, companies are liable to prosecution and must expect high fines. According to the data theft study by the auditing and consulting firm EY 44% of the companies surveyed had concrete evidence of cyberattacks in 2020. Almost all of the companies surveyed (99%) expect hacker attacks to increase in the future. It is therefore becoming increasingly important to invest in data security.
Multi-factor authentication is still one of the first and simplest measures that companies should take. Used correctly, an MFA secures access to company data better than a simple user name and password. In general, every authentication request should be taken seriously and checked before it is confirmed. Strong passwords are also required, consisting of a combination of upper and lower case letters as well as special characters and numbers.
Reliable IT solutions are required in order to have an all-round overview of your own infrastructure and to control it centrally. Client management platforms such as ACMP offer options for customised configuration and can therefore be adapted to specific requirements. Administrative tasks that take up a lot of time and resources on a day-to-day basis can be organised simply and (partially) automatically using a wide range of modules. These include, for example, simple operating system installation, integrated Windows update management, inventory and patch and vulnerability management. Additional tools such as the ACMP Security Detective also enable continuous monitoring and status checks of the firewall, virus and spyware protection. If new vulnerabilities arise, they can be recognised and averted immediately.
The encryption of operating systems and drives, and therefore of data, is another core element of protection against data theft. The encryption process is based on two important cornerstones: The key, which is used to make data and messages unrecognisable, and the rule to which the key must conform. The well-known symmetric encryption standards include Advanced Encryption Standard (AES) and Triple DES. AES is currently one of the most secure standards and is used by companies and governments worldwide. Triple DES differs only slightly from AES in terms of structure and function and offers a similarly high level of protection. Extensions such as ACMP BitLocker Management offer additional functions with which a high level of encryption protection can be achieved. These include the automated starting and stopping of encryption and status queries for encryption protection devices.
Regular virus scans are useful for identifying risks at an early stage and removing harmful programmes as quickly as possible. With ACMP Defender Management, IT administrators can monitor and manage all clients and servers from a central interface, without having to use additional antivirus solutions. Critical IT infrastructures in particular can be optimally administered in this way, as all the necessary components are operated on site.
Cyberattacks and data theft can pose serious problems for companies. Cyber criminals are constantly finding new ways to penetrate protected software architectures and access sensitive and protected data. For this reason, security precautions must be constantly reviewed and adapted to prevent attacks and data theft. With modern technologies, up-to-date standards and a holistic IT solution, Aagon is a strong partner when it comes to IT security.
Es scheint, als wären Sie auf nicht auf der gewünschten Sprachversion dieser Website gelandet. Möchten Sie wechseln?