New type of attack discovered: First in-the-wild UEFI bootkit - irrevocable damage imminent

New study: defense against cyber attacks is a top priority

4月 05, 2023

Almost one in ten companies in Germany was affected by an IT security incident last year - this is the result of a representative Ipsos survey commissioned by the TÜV Association among 501 companies with 10 or more employees. IT security officers, including senior cybersecurity experts, IT managers and members of senior management, were interviewed for "The TÜV Cybersecurity Study".

IT security has reached top management

The incidents involved successful cyberattacks or other security-related incidents such as acts of sabotage or hardware theft - usually with serious consequences. Because in addition to the inaccessibility of services, leakage of sensitive data or production downtime, many companies report above all severe damage to their reputation. And despite the daily news of cyber attacks and increasing awareness, it is still too often stated: "The company was not able to protect itself sufficiently". However, the study also shows that defending against cyberattacks is now a top priority for German companies. The majority of respondents invest in knowledge, practical tests and protective hardware and software. Cybersecurity is perceived by more and more companies as business-critical and protective measures as a competitive advantage. This also shows that IT security is no longer just a topic for IT departments, but has reached top management.

Comprehensive security against malware

According to the TÜV study, the dominant types of attack are phishing and ransomware. Internet surfing in particular harbors numerous opportunities for attack. Virtualized browsers, such as the R&S®Browser in the Box developed with the German Federal Office for Information Security (BSI), close the security gap by providing a "digital quarantine" for cyber attacks. The central mechanism is a hardened system: This system and the browser are separated from each other, so the malware remains isolated and cannot send data to the network or reload additional code. The mechanism protects not least against attacks via e-mail attachments. But software providers can also no longer tap into users' behavioral data. For users, meanwhile, there are no restrictions of any kind on Internet use.

The virtualization of the microphone and webcam also makes web conferences secure and prevents unauthorized access to the camera or microphone. The restart of the browser, by the way, always takes place in a virus-free state.

联系我们

如果您有任何疑问或需要了解更多信息,请填写此表格,我们会尽快回复您。

推广许可

我同意通过以下方式接收罗德与施瓦茨提供的信息:

我同意通过电子邮件或邮政信件接收罗德与施瓦茨公司和本网站版权标记指明的罗德与施瓦茨实体或子公司提供的营销或广告信息(例如特价优惠和折扣促销信息)。有关个人数据使用和撤销程序的详情,请参阅隐私声明推广许可

你的申请已提交,我们稍后会联系您。
An error has occurred, please try again later.