As the digitization of companies progresses, information security must also be kept in mind at all times, because hackers exploit every loophole they can find. Thus, cyberattacks are a serious business risk, not only for large, but also for small and medium-sized enterprises. To counter this in the best possible way, clear emergency concepts for cyberattacks are needed.
Organized attacks with high criminal energy have been increasing in recent years. A particularly recent example is the attack on the online comparison service Comparis. Hackers have paralyzed the website and gained access to customer data. The seemingly only way out of the company – surrender to the blackmailers. Comparis said it settled and paid a ransom for the decryption. A strategy that industry experts do not recommend. (A detailed report on the case can be found here).
The problem here is also that cyber risks can only be partially insured, as the risks are very diverse. It is virtually impossible to cover all hazards, but there are some cybersecurity insurance policies with various ranges of benefits.
If a cyberattack occurs, it is important to be prepared and to have an up-to-date and well-rehearsed emergency concept. Often, however, this is precisely what is lacking in SMEs. It is therefore necessary to create an internal organization within the company. To do this, a company should ask itself these three questions in particular:
Clear responsibilities and areas of responsibility are essential for an emergency concept in the event of cyberattacks. It should be precisely defined in advance who will take on the following roles and functions and whether they are to be filled internally or externally:
An emergency concept can only prepare a company for contingencies. As with cybersecurity insurance, it is nearly impossible to have a plan in place for all risks. Nevertheless, there are common threat types for which a company can equip itself individually:
The threat situation may change over time. For example, as described above, cyberattacks on companies are becoming more frequent, and natural disasters are spreading to regions that were not affected 10 years ago as a result of climate change. Therefore, it is recommended to regularly review and update the threats and subsequent measures.
In addition, the threats can still be expanded by their probability of occurrence and impact. Accordingly, the measures must also be adjusted.
Once the responsible parties have been determined and the most likely threats have been identified, it is important to develop a procedure for the emergency in question. Some of the following procedures may apply to multiple threat situations.
The best possible cybersecurity is characterized by a combination of intelligent and modern technologies, as well as clearly structured processes and good preparation. As a company, you need to be aware of the threat level of potential attacks and be prepared to take targeted and rapid action. This is best achieved with a clear, well-rehearsed emergency concept for cyberattacks. The goal is to keep the damage as low as possible.
If you want to know more about cybersecurity, our Cybersecurity Awareness Training provides you with basic knowledge about current, high-consequence risks. Learn how to protect your data in the best possible way – from technology to possible human errors, we make you fit in cybersecurity!
You do not yet know the current status of your company in the area of cybersecurity? No problem. With our standardized procedure, based on scientifically recognized methods, we work out your personal starting position together with you using the Cybersecurity Risk Assessment.