09/20/2018

Additional Focus: Cyber Security for Visitors and Exhibitors

Targeted and untargeted cyber attacks on companies are the norm in the meantime. The damage caused by successful attacks is considerable. The total damage caused by IT-supported crime in the German economy was estimated by the industry association Bitkom to be around 55 billion euros in 2017, with an upward trend (plus eight percent). Nevertheless, other forms of crime directed against the economy are not expected to become negligible as a result of this. For example, the police recorded around 45,000 cases of aggravated thefts from service, office, fabrication, workshop and storage rooms in 2017. Thus, it is still indispensable to take protective measures at property boundaries or on buildings and to carry out the surveillance of sites, rooms or valuables.
The current development of the danger will be reflected in the programme at the global fair for civil security, Security Essen. In addition to the accustomed strong range on offer for classic, physical security, attention will this year focus on digital security more strongly than until now. This will be illustrated, amongst other ways, by the facts that a separate hall (Hall 8) will be available to the subjects of Cyber Security and Economic Security for the first time and a fair-accompanying Cyber Security Conference will be staged together with BHE Federal Association for Security Technology. Here, additional competence will be ensured by the specialist support of the Federal Office for Information Security (BSI). Both the users and suppliers of security technology will be given the opportunity to obtain extensive information about the latest attack scenarios and defence possibilities here.
Hacker Groups are Targeting State Institutions
Public interest is centring, above all, on the APTs (Advanced Persistent Threats), attacks which are sophisticated, are carried out over longer times, are based on complex plans, are targeted and, because of the scopes of time and finance, are mostly attributed to hacker groups working with the support of intelligence services. They are often aimed at state institutions or critical infrastructures. However, in this respect, there is more to it as a rule. Some of those weak spots in the IT processes which are recognized during the targeted attacks or specially developed malware programs are taken up by the criminal hacker scene and are utilised in an untargeted way en masse. Common attack variants are aimed, above all, at the tapping of external IT for the time-consuming and energy-intensive mining of cryptocurrencies (cryptojacking), at blackmail when encryption software prevents the data owners from gaining access to their data (ransomware) and at the targeted theft of passwords and other personal data for the most diverse fraudulent acts.
83 Percent of Companies are Attacked Every Month
Not only every user and every computer but also every other device which is directly or indirectly connected with the Internet are being attacked - and that time and time again. Even if the majority of the attacks are warded off in spam and malware filters, successful attacks and thus damage caused by cyber attacks are probable occurrences for companies. According to the latest Cyber Security Report by the consulting company Deloitte, 83 percent of the surveyed companies detect at least one attack on them per month. At half of these companies, there is even an alarm every day. However, in the opinion of the Federal Criminal Police Office, such surveys probably show just the tip of the iceberg because not every attack which is successful from the perpetrator's viewpoint is noticed and nobody outside the company is informed about these attacks.
Information Technology Plays a Central Role in Security Solutions
According to surveys by the IT insurer Hiscox, one successful cyber attack in Germany causes damage amounting to an average of Euro 46,000 per SME and Euro 342,000 in companies with more than 1,000 employees. In many cases, the damage may even run into the millions, right up to jeopardising their existence. One important aspect of the Cyber Security Conference will be to use examples in order to highlight how security suppliers can ensure that their solutions do not include any potentially dangerous weak spots.
Many exhibitors at Security Essen 2018 will offer security solutions in which information technology plays a central role. Surveillance, analysis, communication and documentation are no longer conceivable without microprocessors, without software support and without network connection. Correspondingly, a lot of suppliers of classic security solutions are also focusing on the subject of cyber security. Not only with regard to their solutions offered to the customers but also in their own interests since retrofitting requirements (e.g. because surveillance cameras are easy to hijack, hotel locking systems can be outsmarted or alarm systems can be sabotaged) are bad for their image and, in most cases, for the company results too.
In addition to security solutions with integrated IT security, particularly medium-sized enterprises without any special IT security competence in house will be interested in those ranges which are offered by the exhibitors and include the outsourcing of cyber security tasks, e.g. at the Cyber Defense Center Security of Deutsche Telekom. The portfolio at the fair will be supplemented by external consultants, such as PwC Cyber Security Services or the computer centre consultant VZM.