Miniseries

Securing your organization’s
cyberspace – Step 1

Detecting vulnerabilities

Are you thinking about how to make your organization more secure in cyberspace? Or do you just want to make sure you’re doing it right? In our series, we have 6 basic steps for you to be well prepared for the threat of cyber attacks. Today we’ll look at the first one.

1. Identify all vulnerabilities and possible entry points into the organization’s perimeter

6.5 hours – the global average clearly shows that we spend a large part of our waking hours online. When we add to this the widespread digitization of processes and documents, it is immediately clear why the number of cyber attacks is also growing exponentially.

Various studies report that more than half of small and medium-sized enterprises in Europe experience at least one cyberattack per year. These are most often DDoS attacks (77%), followed by ransomware, which causes the greatest financial damage. Government agencies and healthcare facilities are also popular targets for hackers, as they handle large amounts of sensitive data and, unlike the banking sector, for example, have long been underfunded in terms of personnel, technology, and finances. So where do we even begin when we realize the need to adequately address the pitfalls of the digital world? It is necessary to conduct a detailed survey of the systems used and identify their weaknesses.

What questions should we ask?

Where and how do our employees log in during the workday? Are the web interfaces of our internal systems sufficiently secure?

Why?

The goal of an attack may not be to completely destroy data, but rather to steal it over a long period of time. Finding vulnerabilities is the starting point for effectively securing an organization.

Our tip

Be careful with systems that are easily accessible from the internet without any protection. The most sensitive issue is insufficiently protected logins—80% of successful hacker attacks were caused by compromised login credentials. A simple and effective tool is to implement multi-factor authentication, for example, through a chip card or mobile app.