A technical contribution from Industrystock.com
Privacy 4.0: Protection against IT industrial espionage
In the business world, industrial espionage has become one of the biggest threats. In addition to the blackmail of payments in this context, the data theft in the form of internal know-how is an acute problem. But where are the most common problems and how can companies protect themselves from this growing threat?
Privacy 4.0: Protection against IT industrial espionage
In the business world, industrial espionage has become one of the biggest threats. In addition to the blackmail of payments in this context, the data theft in the form of internal know-how is an acute problem. But where are the most common problems and how can companies protect themselves from this growing threat?
1. What exactly is industrial espionage?
1. What exactly is industrial espionage?
Basically, the term industrial espionage can be divided into two areas.
First, there is the so-called industrial espionage, which is a state-sponsored spying, which usually emanates from foreign intelligence services. On the other hand, there is also competition espionage. These include espionage actions carried out by private companies, usually aimed at giving themselves a competitive advantage.
In most cases, the focus of competition espionage is the procurement of third-party know-how.
Due to the progressive digitization in the company environment, today’s perpetrators mainly act via the Internet. Especially the interface between the company network and the Internet often serves as an entry point for hackers.
Furthermore, the spread of false information about certain companies has recently gained in importance. For example, measures of this type attempt to influence the stock market price or damage the reputation of a competitor. These and other current events repeatedly show the limits of IT security.
Basically, the term industrial espionage can be divided into two areas.
First, there is the so-called industrial espionage, which is a state-sponsored spying, which usually emanates from foreign intelligence services. On the other hand, there is also competition espionage. These include espionage actions carried out by private companies, usually aimed at giving themselves a competitive advantage.
In most cases, the focus of competition espionage is the procurement of third-party know-how.
Due to the progressive digitization in the company environment, today’s perpetrators mainly act via the Internet. Especially the interface between the company network and the Internet often serves as an entry point for hackers.
Furthermore, the spread of false information about certain companies has recently gained in importance. For example, measures of this type attempt to influence the stock market price or damage the reputation of a competitor. These and other current events repeatedly show the limits of IT security.
2. Which areas are particularly at risk?
2. Which areas are particularly at risk?
As recent polls show, every third German company has been the victim of a cyberattack in the past.
Above all, companies from the classical industry, such as Suppliers of gearboxes in mechanical engineering as well as manufacturers in the automotive industry are disproportionately affected. For example, Siemens alone records around 1,000 active attempts to attack the IT infrastructure each month.
In particular, the intensive development work of German products and the resulting efficiency of the products make the companies an attractive destination for many hackers abroad.
Since the attacks on the digital way are relatively unspectacular and high concealed effort, they are often noticed very late by the victims. The persecution of the perpetrators is also very difficult in practice, because the attacks usually originate abroad such as. Have Russia or China.
As recent polls show, every third German company has been the victim of a cyberattack in the past.
Above all, companies from the classical industry, such as Suppliers of gearboxes in mechanical engineering as well as manufacturers in the automotive industry are disproportionately affected. For example, Siemens alone records around 1,000 active attempts to attack the IT infrastructure each month.
In particular, the intensive development work of German products and the resulting efficiency of the products make the companies an attractive destination for many hackers abroad.
Since the attacks on the digital way are relatively unspectacular and high concealed effort, they are often noticed very late by the victims. The persecution of the perpetrators is also very difficult in practice, because the attacks usually originate abroad such as. Have Russia or China.
3. What are signs of an attack carried out?
3. What are signs of an attack carried out?
As mentioned before, in most cases attacks can not be detected directly.

It is often noticed on the basis of indirect signs that one’s own company has been the victim of a spy attack.
A clear indicator is, among other things, when a direct competitor brings plagiarism of its own developments on the market. Even the sudden appearance of secret information on the Internet – so-called leaks – is a clear sign that their own servers were cracked.
Should a competing company always respond to the publication of its own innovations at the right time, this may also point to espionage attacks.
As mentioned before, in most cases attacks can not be detected directly.

It is often noticed on the basis of indirect signs that one’s own company has been the victim of a spy attack.
A clear indicator is, among other things, when a direct competitor brings plagiarism of its own developments on the market. Even the sudden appearance of secret information on the Internet – so-called leaks – is a clear sign that their own servers were cracked.
Should a competing company always respond to the publication of its own innovations at the right time, this may also point to espionage attacks.
4. How can security be increased?
4. How can security be increased?
Even though the level of intelligence is very low in the area of cybercrime, attacks should always be reported to the competent authorities.
Furthermore, it is advisable to optimize your own IT defense mechanisms. It is important here that not only selective solutions are chosen, but rather a holistic concept is developed
Since many attacks are carried out in the form of ransomware, DDoS attacks, brute force methods, etc., also the own staff must be informed about the mechanisms of phishing emails, hacker attacks and other fraud attempts.
Special attention is still to be paid to the technology used, such as routers, server and desktop operating systems as well as application programs such as office software & Co. Outdated hardware and software, in particular, often has numerous backdoors that hackers use to bypass security barriers.
So it’s important to keep the technology up to date and to provide regular updates.

Even though the level of intelligence is very low in the area of cybercrime, attacks should always be reported to the competent authorities.
Furthermore, it is advisable to optimize your own IT defense mechanisms. It is important here that not only selective solutions are chosen, but rather a holistic concept is developed
Since many attacks are carried out in the form of ransomware, DDoS attacks, brute force methods, etc., also the own staff must be informed about the mechanisms of phishing emails, hacker attacks and other fraud attempts.
Special attention is still to be paid to the technology used, such as routers, server and desktop operating systems as well as application programs such as office software & Co. Outdated hardware and software, in particular, often has numerous backdoors that hackers use to bypass security barriers.
So it’s important to keep the technology up to date and to provide regular updates.

Search the net for other topics:
Search the net for other topics:
About the author:
Über den Autor:
Popular Posts:
Create a Word letter template with form fields
Erstellen Sie eine professionelle Briefvorlage nach DIN 5008 mit Formularfeldern und Dropdownlisten in Microsoft Word, und schreiben Briefe so leicht wie Sie ein Formular ausfüllen würden.
Protect Word documents from editing
Protect your documents in Microsoft Word from unauthorized editing or block access completely.
Show and remove duplicate entries in Excel | Tutorial
Wir erklären wie Sie doppelte Einträge aus Excel entfernen. Und auch wie Sie doppelte Einträge in Excel nur anzeigen aber nicht gleich löschen um im Einzelfall zu entscheiden.
The Xreference function – difference to Sreference and Wreference
Den Sverweis und den Wverweis kennt so ziemlich jeder der Excel verwendet. Etwas neuer hingegen ist der Xverweis mit dem sich einige Schwächen der bislang genutzten Funktionen ausbügeln lassen. Wir erklären die Unterschiede von Xverweis zu Sverweis & Wverweis.
Custom Formatting Excel – Number Format Codes Excel
Wir erläutern an einem praktischen Beispiel die Bedeutung und die Einsatzmöglichkeiten der benutzerdefinierten Formatierung in Excel. Zahlenformatcodes in Excel sind kein Hexenwerk!
Apply nested functions in Excel
Nested functions in Excel offer the possibility to combine several arguments with each other or to exclude conditions. We explain how it works.
Word & Excel Templates:
Word CV Templates:
Monthly Bestseller:
Popular Posts:
Create a Word letter template with form fields
Erstellen Sie eine professionelle Briefvorlage nach DIN 5008 mit Formularfeldern und Dropdownlisten in Microsoft Word, und schreiben Briefe so leicht wie Sie ein Formular ausfüllen würden.
Protect Word documents from editing
Protect your documents in Microsoft Word from unauthorized editing or block access completely.
Show and remove duplicate entries in Excel | Tutorial
Wir erklären wie Sie doppelte Einträge aus Excel entfernen. Und auch wie Sie doppelte Einträge in Excel nur anzeigen aber nicht gleich löschen um im Einzelfall zu entscheiden.
The Xreference function – difference to Sreference and Wreference
Den Sverweis und den Wverweis kennt so ziemlich jeder der Excel verwendet. Etwas neuer hingegen ist der Xverweis mit dem sich einige Schwächen der bislang genutzten Funktionen ausbügeln lassen. Wir erklären die Unterschiede von Xverweis zu Sverweis & Wverweis.
Custom Formatting Excel – Number Format Codes Excel
Wir erläutern an einem praktischen Beispiel die Bedeutung und die Einsatzmöglichkeiten der benutzerdefinierten Formatierung in Excel. Zahlenformatcodes in Excel sind kein Hexenwerk!
Apply nested functions in Excel
Nested functions in Excel offer the possibility to combine several arguments with each other or to exclude conditions. We explain how it works.