FAQ

FAQ

Answers to your questions

Frequently Asked Questions

We have compiled a list of answers to frequently asked questions.

IT security refers to the protective measures taken to ensure the confidentiality, integrity and availability of information and systems. It covers aspects such as network and server security, application security and data protection.

IT security is important to ensure the confidentiality, integrity and availability of data and IT systems. Increasing digitalisation and networking in all areas of life has led to an enormous rise in the importance of IT security in recent years.

Cyber security refers to the protection of computer networks, systems, devices and data from online crime threats, including malware, ransomware, phishing and other attacks. Cyber security is an important component of IT security.

Vulnerability management is the process of identifying, prioritising and remediating vulnerabilities in IT systems and applications. The goal of vulnerability management is to minimise the risks posed by vulnerabilities by identifying and fixing them quickly before they can be exploited by attackers.

IT security is important to ensure the confidentiality, integrity and availability of data and systems. Businesses, government agencies and individuals are increasingly affected by cyber-attacks, which can have financial and legal consequences and affect customer and public confidence.

The most common threats to IT security are malware, ransomware, phishing, social engineering, DDoS attacks and vulnerabilities in systems and applications.

A penetration test, also called a pen test, is a method of assessing the security of IT systems and applications by performing an authorised attack. The aim is to identify vulnerabilities in systems and applications before they can be exploited by attackers.

There are several steps you can take to improve your IT security, including implementing firewalls and antivirus software, regularly updating operating systems and applications, using strong passwords, training employees on cyber security and conducting penetration tests.

A security incident is an event in which the security of IT systems or data is compromised. These can include data leaks, unauthorised access, malware infections and other types of cyber attacks.

A security policy is a set of rules and procedures established by a company or organisation to ensure IT security

Information security is a sub-area of IT security and refers specifically to the protection of information from unauthorised access, modification or destruction. Information security is important because information can often contain sensitive data such as personal information, trade secrets or intellectual property.

An attack on information can have serious consequences, such as loss of data, theft of information, damage to the company’s reputation, legal consequences due to breaches of data protection regulations and impairment of business continuity.

There are various attack methods and means that can jeopardise IT security, such as phishing, malware, social engineering, denial-of-service attacks, vulnerabilities in software or hardware and insufficient security precautions.

IT security risk can be minimised by implementing appropriate security measures such as firewalls, anti-virus software, strong passwords, regular updates, training and awareness-raising for staff and an adequate security policy. Regular review and updating of these measures is also necessary.

The IT security of a company can be assessed through a risk analysis and an evaluation of the existing security measures. An external audit or penetration test can also be carried out to uncover vulnerabilities and suggest improvements.

Employees should be regularly trained and sensitised to increase awareness of IT security. A security policy should be created and implemented to ensure that all employees adhere to the same standards. Training can also be conducted using practical examples and exercises.

Digitalisation and digital transformation require more intensive protection of information and IT systems, as an increasing amount of data and information is processed and stored digitally. The security of information is therefore an important prerequisite for the successful implementation of digitisation projects.

Do you have a question that we haven't answered yet?