In principle, the cyber bodyguards distinguish between
two types of attack. Some are random, spreading out in every
direction and attacking any network they encounter. The others
are targeted cyber attacks. These are either staged by private
hackers who, with sporting ambition, pounce on firewalls and
security concepts to demonstrate their own finesse. Or it may be
organized groups with criminal intentions or even state actors.
“In our threat analyses, which we prepare for our customers,
we look at attackers with different resources,” says Kilian
Golm, describing the service concept of
Cyber Security, which is integrated into
the comprehensive security service
portfolio of the corporate Group.
The most famous
cyber
attacks
The list of security incidents in
industry is growing longer all the
time.
One of the most famous was the
mGuard
The hardware is assembled
at the Bad Pyrmont site
Stuxnet
attack of 2010, which had specifically
affected SCADA systems.
The virus
Research in twilight
If you want to fight properly, you have to know who you’re
up against. So do gangsters and slouch hats come and go on
Richard-Willstätter-Straße? Martin Dickopp has to smile:
“No, it’s nothing that dramatic. But it’s true, we also attend
hacker conferences, do research in more difficult-to-access
parts of the Internet, and exchange information in forums
and communities.” Anyone who wants to can have the Berlin
experts carry out a mock attack on their supposedly-secure
company network. “Find the gap” is the motto around here.
Who needs the protection of professional data bodyguards?
“As a matter of fact, every business does. Our customers range
from small, family-owned machine builders to large industrial
Industroyer
,caused a sensation in 2016, and one
year later,
Triton
specifically pounced on safety
controllers.
WannaCry
was a ransomware that had infested
over 230,000 systems by 2017.
companies worldwide. And of course, our own company. Cyber-
crime knows no boundaries,” Golm stresses. “Cybersecurity is a
constant process, not a one-time procedure. You have to think
of security as a system – security by design. Today’s companies
and technologies should consider security in their products, as
well as in their production facilities, from the very start — not
see it as the last safety check at the end of its development and
graft it onto the system.” (lo)
phoenixcontact.com
URGENT/11
is a security vulnerability that became
known in the summer of 2019,
affecting over 2 billion industrial
devices worldwide, and against which
customers can protect themselves
with the help of the mGuard product
family.
The Phoenix Contact innovation magazine
UPDATE 4/20
21