Insight

Cybercrime – a perennial problem

December 2024


Cybercrime is more rampant than ever. As digitalization advances, reports of cyberattacks are also increasing. These involve significant damage amounting to billions. But it is not just corporations that are affected. Private individuals and smaller companies are also affected far too often. The danger lurks in everyday communication.

Beware of the danger points

There are numerous danger points that seem inconspicuous or are mostly even unknown, but nevertheless constantly threaten the IT infrastructure:

• Malware, such as viruses, worms, Trojans, ransomware and spyware, that penetrate IT systems to steal data or damage systems

• Injection attacks, which can lead to attackers inserting malicious code or accessing sensitive data

• Inadequately protected administration areas of the website, through which attackers can gain access and take control of the website

• Distributed denial-of-service (DDoS) attacks on network components and the website, which impair the availability of IT services

• Outdated software in IT systems and the website’s content management system, which can be exploited by attackers to gain unauthorized access.

Identify potential vulnerabilities

It is all the more important that potential vulnerabilities are identified early, and proactive measures are taken. Upgrading in a timely manner can help prevent security incidents and minimize the impact of successful attacks. Penetration tests of the IT infrastructure or vulnerability scans of the website are an important part of a comprehensive security approach. By uncovering vulnerabilities in networks, applications, web portals and other components of the network environment, potential attack opportunities can be identified, and vulnerabilities can be proactively remedied.

Conduct regular tests

For certain types of organisations, and in particular cooperatives and other bodies with savings facilities, penetration tests are a requirement (in Germany and elsewhere) for compliance with regulations and standards such as the banking supervisory requirements for IT (BAIT) or for the operation of an information security management system in accordance with ISO 27001. But for all other companies too, conducting regular penetration tests should be an important part of the comprehensive security concept.

About the author

Roger Palm

Berlin, Germany

Roger is a Senior Consultant and Head of Data Protection and Information Security at DOMUS Consult, part of Russell Bedford’s Berlin member firm, DOMUS AG. DOMUS Consult advises companies and organisations in the private and public sectors. To handle today’s complex challenges, the firm has a motivated team with a range of qualifications, from business economists and lawyers to finance, IT and data protection experts.

palm@domusconsult.de

The Russell Bedford website employs cookies to improve your user experience. We have updated our cookie policy to reflect changes in the law on cookies and tracking technologies used on websites. If you continue on this website, you will be providing your consent to our use of cookies.

Find out more
I accept