Many Swiss companies do not take sufficient care of their IT security. This is the result of an interview of the Neue Zürcher Zeitung with Florian Schütz, the federal government's delegate for cyber security. Although there are great differences between companies, money is tight in many small and medium-sized enterprises (SMEs). However, this is not an argument for not investing in security - on the contrary.
"Cyber attacks can affect everyone", as the National Cyber Security Centre (NCSC) argues. According to current figures, around 22,000 cyber incidents were reported in Switzerland in 2021 alone. These are mainly fraud in the form of ransomware (encryption Trojans), data leakage, CEO fraud, invoice manipulation fraud (BEC fraud), check fraud and domain registration fraud, as well as pishing. Some of the consequences are devastating. Not only can the website go offline, but the entire network can be affected. "In addition to financial damage, confidential information sometimes falls into the wrong hands - with serious consequences: Loss of data, failure of systems, liability claims due to a data protection breach or damage to reputation are some examples," explains the NCSC.
The ransomware, feared by many, essentially enters systems by opening links that lead to malicious websites or malicious file attachments in emails, according to the University of Applied Sciences Northwestern Switzerland. In addition, attackers scan the internet for open remote desktop servers and try to gain access to them using brute force attacks. Another issue is access attempts to other exposed systems such as Pulse Secure VPN or Citrix NetScaler. "Poorly protected systems with missing patches or incorrect configuration are being exploited." To prevent this, the experts emphasise the importance of both technical and organisational measures.
These do not have to be cumbersome and expensive at all. Many solutions applicable in the context of Google technology overcome technical challenges while taking into account the human component. Examples are:
This selection alone shows: Users of Google's collaboration solutions and cloud infrastructure can ensure the highest level of IT security with a variety of effective and user-friendly measures. The individual tools can be adapted exactly to individual requirements. Despite the variety of possibilities, this does not have to be witchcraft. As an official Google partner, we determine where you stand and what your needs are in a security audit, if desired in accordance with the CIS standard. In addition, we support you in the selection and implementation of suitable IT security measures and train your employees. You benefit from the expertise of our specialists and save internal resources so that you can focus entirely on your core business. Simply contact us!
Many Swiss companies do not take sufficient care of their IT security. This is the result of an interview of the Neue Zürcher Zeitung with Florian Schütz, the federal government's delegate for cyber security. Although there are great differences between companies, money is tight in many small and medium-sized enterprises (SMEs). However, this is not an argument for not investing in security - on the contrary.
"Cyber attacks can affect everyone", as the National Cyber Security Centre (NCSC) argues. According to current figures, around 22,000 cyber incidents were reported in Switzerland in 2021 alone. These are mainly fraud in the form of ransomware (encryption Trojans), data leakage, CEO fraud, invoice manipulation fraud (BEC fraud), check fraud and domain registration fraud, as well as pishing. Some of the consequences are devastating. Not only can the website go offline, but the entire network can be affected. "In addition to financial damage, confidential information sometimes falls into the wrong hands - with serious consequences: Loss of data, failure of systems, liability claims due to a data protection breach or damage to reputation are some examples," explains the NCSC.
The ransomware, feared by many, essentially enters systems by opening links that lead to malicious websites or malicious file attachments in emails, according to the University of Applied Sciences Northwestern Switzerland. In addition, attackers scan the internet for open remote desktop servers and try to gain access to them using brute force attacks. Another issue is access attempts to other exposed systems such as Pulse Secure VPN or Citrix NetScaler. "Poorly protected systems with missing patches or incorrect configuration are being exploited." To prevent this, the experts emphasise the importance of both technical and organisational measures.
These do not have to be cumbersome and expensive at all. Many solutions applicable in the context of Google technology overcome technical challenges while taking into account the human component. Examples are:
This selection alone shows: Users of Google's collaboration solutions and cloud infrastructure can ensure the highest level of IT security with a variety of effective and user-friendly measures. The individual tools can be adapted exactly to individual requirements. Despite the variety of possibilities, this does not have to be witchcraft. As an official Google partner, we determine where you stand and what your needs are in a security audit, if desired in accordance with the CIS standard. In addition, we support you in the selection and implementation of suitable IT security measures and train your employees. You benefit from the expertise of our specialists and save internal resources so that you can focus entirely on your core business. Simply contact us!