Categories: Technology

How companies can better protect their data against cyber attacks

For effective protection against hackers and ransomware attacks, it is no longer enough to only secure the digital access doors. What that means and what private and public companies should be doing.
Ann-Kathrin Amstutz / ch media

Data theft, espionage or sabotage: the German Competence Center against Cybercrime (G4C) estimates that nine out of ten companies are victims of a cyber attack. At the end of March, CH Media, to which this portal belongs, was also hit by a cyber attack.

The attacks often go unnoticed for a long time. Criminals can sometimes transfer data for months without noticing. The numbers make it clear: almost every company will be attacked by cybercriminals sooner or later – and should protect itself accordingly.

sender of this alarming message Comforte, a German company specialized in data security. According to its own statements, Comforte secures 60 percent of global card payment transactions, such as those of Visa and Mastercard.

Why it’s not enough to protect the doors

Noisy Comforte CEO Michael Deissner there needs to be a paradigm shift in data protection. Until now, most companies would focus on infrastructure and network security. They take measures to prevent criminals from entering the system. The access doors to the system are closed as well as possible. According to Deissner, that’s not enough.

More and more companies, but also private users, store their data in cloud solutions. This means they lose some control over their data as it is stored on the cloud provider’s servers. The cloud offers a degree of protection. But once the walls are breached, the data can often be seen – a nightmare scenario for any business.

According to Deissner, companies should therefore pay attention to so-called “data-centric security”, ie the protection of the data itself, which must specifically be encrypted by default. Data must remain protected for its entire life – from collection to storage, processing and transmission to deletion.

The target:

Even if criminals break into the system and steal data, they cannot do anything with it.

One way to do this is with classical encryption. The data is converted into an unreadable format using an algorithm and a key.

A second possibility is the so-called tokenization. According to Comforte boss Deissner, tokenization has been around since 2018, but the method is still little known. Plain text data is replaced by so-called tokens.

Unlike classical encryption, the token retains the format of the original data. With a credit card number, for example, only the digits are exchanged – again a series of 16 digits is created. Or the “@” sign remains in the correct place for an email address.

Encryption and tokenization have different advantages and disadvantages. In encryption, there is a mathematical relationship between the original value and the encrypted value.

This makes the encryption reversible, which poses a risk: if a hacker breaks the algorithm, he can decipher all encrypted values.

In addition, the data is made completely unrecognizable and must be decrypted again for each processing.

Conclusion: Absolute security does not exist

With tokenization, on the other hand, the data can be used in business processes and analytics even in a secure state, since the format is not changed. In addition, there is less risk of the code being cracked because there is no mathematical connection between the original value and its secure counterpart.

However, this also means that since there is no connection, it is much more difficult to undo a tokenization. So if there is data theft, one cannot just convert the tokens to the original data and insert a new token.

In addition, the number of possible combinations is limited: the more tokens in circulation, for example for credit card numbers, the greater the risk that the same token will be used several times. Tokenization also cannot provide absolute security.

Whether it’s encryption or tokenization, companies will hardly be able to avoid data-centric security. The risks and damage of cyber attacks are simply too great.

On my own account
At the end of March, the publishing company CH Media, which also owns the news portal watson, was hit by an attack by the cybercriminal group “Play”. Unfortunately, customer data was also stolen from CH Media and published on the Darknet. It was possible to regain sovereignty over the IT systems in a short time. The functionality of the IT infrastructure has now been largely restored.
Victim of a ransomware attack? Therefore, those affected do not have to pay
The National Center for Cybersecurity NCSC advises against paying the ransom and warns: “There is no guarantee that once the ransom is paid, the criminals will not publish the data or make any other profit from it. In addition, each successful extortion motivates the attackers to continue, finances the further development of the attacks and promotes their spread.”

Should victims nevertheless consider paying a ransom, the NCSC strongly recommends discussing these steps with the cantonal police.

The website https://www.nomoreransom.org/ provides tips on how to identify the malware and the ability to download known keys. Nomoreransom.org is a joint project of the Dutch police and Europol, in which the Swiss Confederation is also involved.

Source: Watson

Share
Published by
Ella

Recent Posts

Terror suspect Chechen ‘hanged himself’ in Russian custody Egyptian President al-Sisi has been sworn in for a third term

On the same day of the terrorist attack on the Krokus City Hall in Moscow,…

1 year ago

Locals demand tourist tax for Tenerife: “Like a cancer consuming the island”

class="sc-cffd1e67-0 iQNQmc">1/4Residents of Tenerife have had enough of noisy and dirty tourists.It's too loud, the…

1 year ago

Agreement reached: this is how much Tuchel will receive for his departure from Bayern

class="sc-cffd1e67-0 iQNQmc">1/7Packing his things in Munich in the summer: Thomas Tuchel.After just over a year,…

1 year ago

Worst earthquake in 25 years in Taiwan +++ Number of deaths increased Is Russia running out of tanks? Now ‘Chinese coffins’ are used

At least seven people have been killed and 57 injured in severe earthquakes in the…

1 year ago

Now the moon should also have its own time (and its own clocks). These 11 photos and videos show just how intense the Taiwan earthquake was

The American space agency NASA would establish a uniform lunar time on behalf of the…

1 year ago

This is how the Swiss experienced the earthquake in Taiwan: “I saw a crack in the wall”

class="sc-cffd1e67-0 iQNQmc">1/8Bode Obwegeser was surprised by the earthquake while he was sleeping. “It was a…

1 year ago