A technical contribution from Industrystock.com

Advertisement

Privacy 4.0: Protection against IT industrial espionage
How can companies protect themselves?

In the business world, industrial espionage has become one of the biggest threats. In addition to the blackmail of payments in this context, the data theft in the form of internal know-how is an acute problem. But where are the most common problems and how can companies protect themselves from this growing threat?

Datenklau 4.0 - Schutz vor Industriespionage
Advertisement
SanDisk Ultra 64GB (SDSQUAR-064G-GN6MA) microSDXC Speicherkarte + Adapter bis zu 100 MB/Sek, Class 10, U1, A1,Grau, Rot
SanDisk Ultra 64GB (SDSQUAR-064G-GN6MA) microSDXC ...*
by SanDisk

Kapazität: 64 GB, Flash Card Typ: MicroSDXC, Flash-Memory-K...

List Price: € 30.99 You Save: € 11.99 (39%) Prime Price: € 19.00 zum Angebot*
Price incl. VAT., Excl. Shipping
*Zuletzt aktualisiert am 17. August 2018 um 12:52 . Preise können sich geändert haben. Alle Angaben ohne Gewähr.

Privacy 4.0: Protection against IT industrial espionage

In the business world, industrial espionage has become one of the biggest threats. In addition to the blackmail of payments in this context, the data theft in the form of internal know-how is an acute problem. But where are the most common problems and how can companies protect themselves from this growing threat?

Datenklau 4.0 - Schutz vor Industriespionage
Advertisement
SanDisk Ultra 64GB (SDSQUAR-064G-GN6MA) microSDXC Speicherkarte + Adapter bis zu 100 MB/Sek, Class 10, U1, A1,Grau, Rot
SanDisk Ultra 64GB (SDSQUAR-064G-GN6MA) microSDXC ...*
by SanDisk

Kapazität: 64 GB, Flash Card Typ: MicroSDXC, Flash-Memory-K...

List Price: € 30.99 You Save: € 11.99 (39%) Prime Price: € 19.00 zum Angebot*
Price incl. VAT., Excl. Shipping
*Zuletzt aktualisiert am 17. August 2018 um 12:52 . Preise können sich geändert haben. Alle Angaben ohne Gewähr.

1. What exactly is industrial espionage?

1. What exactly is industrial espionage?

Basically, the term industrial espionage can be divided into two areas.

First, there is the so-called industrial espionage, which is a state-sponsored spying, which usually emanates from foreign intelligence services. On the other hand, there is also competition espionage. These include espionage actions carried out by private companies, usually aimed at giving themselves a competitive advantage.

In most cases, the focus of competition espionage is the procurement of third-party know-how.

Due to the progressive digitization in the company environment, today’s perpetrators mainly act via the Internet.

Especially the interface between the company network and the Internet often serves as an entry point for hackers.

Advertisement

Furthermore, the spread of false information about certain companies has recently gained in importance. For example, measures of this type attempt to influence the stock market price or damage the reputation of a competitor. These and other current events repeatedly show the limits of IT security.

Basically, the term industrial espionage can be divided into two areas.

First, there is the so-called industrial espionage, which is a state-sponsored spying, which usually emanates from foreign intelligence services. On the other hand, there is also competition espionage. These include espionage actions carried out by private companies, usually aimed at giving themselves a competitive advantage.

In most cases, the focus of competition espionage is the procurement of third-party know-how.

Due to the progressive digitization in the company environment, today’s perpetrators mainly act via the Internet.

Especially the interface between the company network and the Internet often serves as an entry point for hackers.

Advertisement

Furthermore, the spread of false information about certain companies has recently gained in importance. For example, measures of this type attempt to influence the stock market price or damage the reputation of a competitor. These and other current events repeatedly show the limits of IT security.

2. Which areas are particularly at risk?

2. Which areas are particularly at risk?

As recent polls show, every third German company has been the victim of a cyberattack in the past.

Above all, companies from the classical industry, such as Suppliers of gearboxes in mechanical engineering as well as manufacturers in the automotive industry are disproportionately affected. For example, Siemens alone records around 1,000 active attempts to attack the IT infrastructure each month.

In particular, the intensive development work of German products and the resulting efficiency of the products make the companies an attractive destination for many hackers abroad.

Advertisement

Since the attacks on the digital way are relatively unspectacular and high concealed effort, they are often noticed very late by the victims. The persecution of the perpetrators is also very difficult in practice, because the attacks usually originate abroad such as. Have Russia or China.

As recent polls show, every third German company has been the victim of a cyberattack in the past.

Above all, companies from the classical industry, such as Suppliers of gearboxes in mechanical engineering as well as manufacturers in the automotive industry are disproportionately affected. For example, Siemens alone records around 1,000 active attempts to attack the IT infrastructure each month.

In particular, the intensive development work of German products and the resulting efficiency of the products make the companies an attractive destination for many hackers abroad.

Advertisement

Since the attacks on the digital way are relatively unspectacular and high concealed effort, they are often noticed very late by the victims. The persecution of the perpetrators is also very difficult in practice, because the attacks usually originate abroad such as. Have Russia or China.

3. What are signs of an attack carried out?

3. What are signs of an attack carried out?

As mentioned before, in most cases attacks can not be detected directly.

Hackerangriff - Industriespionage

It is often noticed on the basis of indirect signs that one’s own company has been the victim of a spy attack.

A clear indicator is, among other things, when a direct competitor brings plagiarism of its own developments on the market. Even the sudden appearance of secret information on the Internet – so-called leaks – is a clear sign that their own servers were cracked.

Should a competing company always respond to the publication of its own innovations at the right time, this may also point to espionage attacks.

As mentioned before, in most cases attacks can not be detected directly.

Hackerangriff - Industriespionage

It is often noticed on the basis of indirect signs that one’s own company has been the victim of a spy attack.

A clear indicator is, among other things, when a direct competitor brings plagiarism of its own developments on the market. Even the sudden appearance of secret information on the Internet – so-called leaks – is a clear sign that their own servers were cracked.

Should a competing company always respond to the publication of its own innovations at the right time, this may also point to espionage attacks.

4. How can security be increased?

4. How can security be increased?

Even though the level of intelligence is very low in the area of cybercrime, attacks should always be reported to the competent authorities.
Furthermore, it is advisable to optimize your own IT defense mechanisms. It is important here that not only selective solutions are chosen, but rather a holistic concept is developed

Advertisement
#1
Fitbit Versa Health & Fitness Smartwatch
Fitbit Versa Health & Fitness Smartwatch*
by FITET|#Fitbit

FitBit VERSA. Leichte und wasserfeste Smartwatch, mit der Ge...

Price not available zum Angebot*
Price incl. VAT., Excl. Shipping
*Zuletzt aktualisiert am 17. August 2018 um 13:32 . Preise können sich geändert haben. Alle Angaben ohne Gewähr.

Since many attacks are carried out in the form of ransomware, DDoS attacks, brute force methods, etc., also the own staff must be informed about the mechanisms of phishing emails, hacker attacks and other fraud attempts.

Special attention is still to be paid to the technology used, such as routers, server and desktop operating systems as well as application programs such as office software & Co. Outdated hardware and software, in particular, often has numerous backdoors that hackers use to bypass security barriers.

So it’s important to keep the technology up to date and to provide regular updates.

Datensicherheit in Unternehmen

Conclusion:

Since espionage attacks can cause great damage to companies, which may even threaten their existence, companies should not take the subject of IT security lightly. In principle, an investment in your own digital infrastructure always pays off.

Print Friendly, PDF & Email

Even though the level of intelligence is very low in the area of cybercrime, attacks should always be reported to the competent authorities.
Furthermore, it is advisable to optimize your own IT defense mechanisms. It is important here that not only selective solutions are chosen, but rather a holistic concept is developed

Advertisement
#1
Fitbit Versa Health & Fitness Smartwatch
Fitbit Versa Health & Fitness Smartwatch*
by FITET|#Fitbit

FitBit VERSA. Leichte und wasserfeste Smartwatch, mit der Ge...

Price not available zum Angebot*
Price incl. VAT., Excl. Shipping
*Zuletzt aktualisiert am 17. August 2018 um 13:32 . Preise können sich geändert haben. Alle Angaben ohne Gewähr.

Since many attacks are carried out in the form of ransomware, DDoS attacks, brute force methods, etc., also the own staff must be informed about the mechanisms of phishing emails, hacker attacks and other fraud attempts.

Special attention is still to be paid to the technology used, such as routers, server and desktop operating systems as well as application programs such as office software & Co. Outdated hardware and software, in particular, often has numerous backdoors that hackers use to bypass security barriers.

So it’s important to keep the technology up to date and to provide regular updates.

Datensicherheit in Unternehmen

Conclusion:

Since espionage attacks can cause great damage to companies, which may even threaten their existence, companies should not take the subject of IT security lightly. In principle, an investment in your own digital infrastructure always pays off.

Print Friendly, PDF & Email
Become Guest Writer

We publish your guest contribution free of charge in German and English
incl. backlink to your website and identification of the author

Anzeige

A technical contribution from Industrystock.com

Blogverzeichnis Bloggerei.de

About the author:

Peter Schmidt
Peter SchmidtIndustrystock.com
Peter Schmidt has been active in the field of e-commerce for 20 years and has been dealing with IT since his first computer in the mid-1980s (Commodore 64). At Deutscher Medien Verlag he supports the project “IndustryStock” (international company search engine).

Search by category:

Advertisement
#1
APEMAN 4K Action Cam 20MP WIFI Wasserdichte Unterwasser Action Kamera 40M Digitale Videokamera mit 170 ° Weitwinkelobjektiv Eis Sony Sensor, Zwei verbesserten Batterien, Transportskoffer und 24 Multiples
APEMAN 4K Action Cam 20MP WIFI Wasserdichte Unterw...*
by Apeman

Das ist unser Leben,verpasse nie wieder einen wunderbaren Mo...

List Price: € 109.99 You Save: € 20.00 (18%) Prime Price: € 89.99 zum Angebot*
Price incl. VAT., Excl. Shipping
*Zuletzt aktualisiert am 17. August 2018 um 15:32 . Preise können sich geändert haben. Alle Angaben ohne Gewähr.

Über den Autor:

Peter Schmidt
Peter SchmidtIndustrystock.com
Peter Schmidt has been active in the field of e-commerce for 20 years and has been dealing with IT since his first computer in the mid-1980s (Commodore 64). At Deutscher Medien Verlag he supports the project “IndustryStock” (international company search engine).

Search by category:

Anzeige
SanDisk Ultra 64GB (SDSQUAR-064G-GN6MA) microSDXC Speicherkarte + Adapter bis zu 100 MB/Sek, Class 10, U1, A1,Grau, Rot
SanDisk Ultra 64GB (SDSQUAR-064G-GN6MA) microSDXC ...*
von SanDisk

Kapazität: 64 GB, Flash Card Typ: MicroSDXC, Flash-Memory-K...

Unverb. Preisempf.: € 30,99 Du sparst: € 11,99 (39%) Prime Preis: € 19,00 zum Angebot*
Preis inkl. MwSt., zzgl. Versandkosten
*Zuletzt aktualisiert am 17. August 2018 um 12:52 . Preise können sich geändert haben. Alle Angaben ohne Gewähr.
2018-08-09T11:33:48+00:00By |Categories: Data Protection, Guest Article|
In order to optimize our website for you and to be able to continuously improve it, we use cookies. By continuing to use the website, you agree to the use of cookies. Ok