Photo: rawpixel on freepik

17. May 2021

Cybercrime: Staying Safe

According to a study by KPMG, in 2020, six out of ten Austrian companies were victims of cyber attacks. However, 41 percent of domestic businesses are not preparing for the financial impacts and expected costs of cyber attacks.

“Cybersecurity is a complex topic, and knowledge about it is often not well established in companies. Often, there is no specialized personnel, and security measures cost a lot of money,” says Walter Unger, Head of the Cyber Defence & ICT Security Department at the Austrian Armed Forces.

Ransom, Sabotage, and Espionage

Cybercriminals often attack companies with the intention of extorting money: company data is encrypted with ransomware and “held hostage,” for which ransom is then demanded. “If companies do not have a secure recovery and backup plan in such a case, they become victims quickly. But regular data backup can counteract this,” says Unger.

Another attack intention is sabotage: systems and servers are paralyzed so that they are no longer accessible. This is especially a problem for e-commerce providers. Here too, ransom is usually demanded. “A third attack intention is espionage,” says Walter Unger. “Usually, trade secrets or specialized know-how are the targets of criminals. After all, we have about 400 hidden champions in Austria – innovative companies that are world leaders in technology. If knowledge is stolen from them, someone else might enter the market faster and maybe even cheaper.”

“The employees and management must be sensitive to possible attacks, including telephone calls and emails, especially through social engineering.”
Walter Unger

Manipulating websites or spreading fake news also counts as cyber attacks and can cause significant damage to companies. For example, it can massively damage the company’s image, which can unsettle employees, customers, shareholders, or even partners. This leads to financial losses and is especially dangerous for SMEs.

Protection against cyber attacks

For the cybersecurity expert, technological measures are an absolute must, and they must be state of the art: “This includes intrusion prevention and intrusion detection systems, firewalls, sandboxing (isolated areas), etc. These must primarily apply to computers that contain genuinely important information.” Encryption also plays a significant role. “Important data must be encrypted and have appropriate rights management. Ideally, companies should have useful encryption that everyone can use – possibly after a brief training,” advises the specialist.

But not all computers need to be protected in this way – it is necessary to assess whether the information on them requires it or not. On average, it takes eight months to detect espionage operations related to cyber attacks. But why does it take so long? “If all these systems are bypassed, and you are not being extorted, it is very difficult to detect cyber attacks. Then you may only notice attacks indirectly by the system behaving differently or data flows going elsewhere than usual.”

Unger-536×640
Walter Unger, cybersecurity expert at the Austrian Armed Forces, Photo: Innovation Salzburg

The Human Factor

In recent years, cases of cybercrime affecting Austrian companies have repeatedly made headlines. In the case of Windtec, a company based in Carinthia, disloyal employee sold know-how in 2011, while in 2016 an employee of FACC, a company based in Upper Austria, fell victim to CEO fraud. In both cases, the human factor played a decisive role. “Employees and executives must be sensitive to possible attacks, including those involving telephone calls and emails, especially through social engineering,” advises Walter Unger.

IoT as a gateway for cybercrime

The Internet of Things (IoT) is connecting more and more devices, leading to significantly more vulnerabilities and entry points than in non-networked systems. While standard systems have firewalls, smart heating, alarm systems, access controls, and similar devices require passwords and appropriate protection. Walter Unger also knows where the dangers lie in these systems: “Often, companies and individuals still use standard passwords. Sometimes the software is flawed and therefore vulnerable. Then there is 5G, which will initially be of interest to industry and companies. With such technologies, one always has to ask what happens if the system fails and something no longer works.”

Covid-19: When digitization needs to happen quickly

Due to the pandemic, many companies have been forced to digitize their processes very quickly. In this case, one should rely on the support of an experienced service provider. “For new home office situations, I advise against an unprotected, direct access to company networks. Until secure access is established, necessary documents should be taken home on a data carrier, edited with a company notebook, and uploaded again after verifying the data carrier on the next office day,” says the expert.

Telecommunications solutions like messengers are increasingly being used. It must be considered that third parties may listen or obtain the transmitted data. “And always remember: clear ‘orders’ regulate the service operation. That means clear instructions, sensitization, and maintaining employee loyalty also help in home office situations.”

To the KPMG study

Your contact for digitization

Nicole Ferber

Nicole Ferber, MSc

(on maternity leave)
Science and Innovation Ecosystem, ICT

+43 5 7599 722 33
nicole.ferber@innovation-salzburg.at

That might also interest you

23. November 2023

Digital Motion: Enhancing Movement with Technology

Several research institutions in Salzburg, along with additional partners, have succeeded in bringing another COMET project to Salzburg with “Digital Motion.” COMET is the flagship program for promoting cutting-edge research in Austria.

17. November 2023

Salzburg gets its first virtual production studio

Take 2 Studios in Salzburg Sam opens Austria’s first virtual production studio.

7. November 2023

Utilizing Funding for Artificial Intelligence (AI)

The Austria Wirtschaftsservice (aws) and the Austrian Research Promotion Agency (FFG) offer various fundings for companies looking to work with new technology.

3. November 2023

On the way to a new world of work

Transparent communication, definition of responsibilities and a new organisational structure: Samson Druck in Lungau has launched a project to successfully manage the generational change. And it will also improve the working conditions of the employees.

Our Newsletter

Bitte füllen Sie das Pflichtfeld aus. / Please fill in the required field.
Bitte füllen Sie das Pflichtfeld aus.
Bitte füllen Sie das Pflichtfeld aus.
Bitte füllen Sie das Pflichtfeld aus.
Bitte füllen Sie das Pflichtfeld aus. / Please fill in the required field.
Bitte füllen Sie das Pflichtfeld aus.