AMNYTT 1/2020 | Page 101

In principle, the cyber bodyguards distinguish between two types of attack. Some are random, spreading out in every direction and attacking any network they encounter. The others are targeted cyber attacks. These are either staged by private hackers who, with sporting ambition, pounce on firewalls and security concepts to demonstrate their own finesse. Or it may be organized groups with criminal intentions or even state actors. “In our threat analyses, which we prepare for our customers, we look at attackers with different resources,” says Kilian Golm, describing the service concept of Cyber Security, which is integrated into the comprehensive security service portfolio of the corporate Group. The most famous cyber attacks The list of security incidents in industry is growing longer all the time. One of the most famous was the mGuard The hardware is assembled at the Bad Pyrmont site Stuxnet attack of 2010, which had specifically affected SCADA systems. The virus Research in twilight If you want to fight properly, you have to know who you’re up against. So do gangsters and slouch hats come and go on Richard-Willstätter-Straße? Martin Dickopp has to smile: “No, it’s nothing that dramatic. But it’s true, we also attend hacker conferences, do research in more difficult-to-access parts of the Internet, and exchange information in forums and communities.” Anyone who wants to can have the Berlin experts carry out a mock attack on their supposedly-secure company network. “Find the gap” is the motto around here. Who needs the protection of professional data bodyguards? “As a matter of fact, every business does. Our customers range from small, family-owned machine builders to large industrial Industroyer ,caused a sensation in 2016, and one year later, Triton specifically pounced on safety controllers. WannaCry was a ransomware that had infested over 230,000 systems by 2017. companies worldwide. And of course, our own company. Cyber- crime knows no boundaries,” Golm stresses. “Cybersecurity is a constant process, not a one-time procedure. You have to think of security as a system – security by design. Today’s companies and technologies should consider security in their products, as well as in their production facilities, from the very start — not see it as the last safety check at the end of its development and graft it onto the system.” (lo)  phoenixcontact.com URGENT/11 is a security vulnerability that became known in the summer of 2019, affecting over 2 billion industrial devices worldwide, and against which customers can protect themselves with the help of the mGuard product family. The Phoenix Contact innovation magazine UPDATE 4/20 21