Hot on the agenda: Cyber attacks
Cyber attacks are on the agenda in a big way. Hardly a day goes by without new information on hackers, malware or IT security issues in general. According to the Federal Republic of Germany’s Annual Report on the Protection of the Constitution, many threat sources including political activists, religious extremists, and state actors have engaged for years in targeted cyber-attacks on German industry.
The focus is mainly on
- Chemicals,
- Pharmaceuticals,
- Engineering,
- Electrical & electronic,
- as well as numerous other sectors characterized by innovative technologies.
In the case of UglyGorilla, the term “hacker” has meanwhile been replaced by “cyber soldier”. Cyber soldiers succeed in remaining undetected in “enemy” computer networks for a very long time, as happened at Thyssen-Krupp (in German).
“WannaCry” and Co.
Only recently, cyber attacks by WannaCry, another malicious software program, made the headlines in newspapers everywhere. Deutsche Bahn, the state owned railway operator, was among the most prominent victims in Germany. In the UK, National Health System hospitals (in Deutsch) in several major cities were paralyzed.
This brutal virus had scarcely been brought under control when the next ones appeared on the scene in its place. Their names: Petya / GoldenEye, both instances of ransomware. Ransomware locks up all files on the computer under attack and demands a payment (ransom) in return for unlocking them. With this particular form of cyber attack, the extent of the damage is instantly evident. You know straight away that you’ve been hacked. Yet what about “silent” or “invisible” espionage attacks?
Click here to learn more about the Petya attack (in German).
How long does a cyber attack remain undetected?
According to a study by Mandiant Consulting, the average time to detect a cyber attack worldwide is 146 days. Here in Europe, it can take as long as 469 days for an attack to become “visible”. That’s more than a year, during which cyber soldiers can roam freely within your company. More than a year in which they can hijack and manipulate your customer and business data.
It’s impossible to say exactly how much damage is caused every year by industrial espionage. Bitcom and VDI are in no doubt that it runs into several tens of billions.
It could hit anyone!
Helping you to help yourself
In the future, you can take advantage of a special seminar at which a Yokogawa trainer will show you:
1.) How a hacker’s mind works
2.) How to recognize the tell-tale signs of a cyber attack
3.) How a professional defense strategy can protect your business
You will be taught the ins and outs of scanning, testing, hacking and protecting your in-house systems in an interactive, learning oriented environment. Through hands-on exercises you and your fellow participants will become deeply familiar with current security systems and gain valuable practical experience.
Is this seminar of interest to you? If so, just write us a comment.
[ot-caption title=”Seminar situation” url=”https://www.yokogawa.com/eu/blog/chemical-pharma/app/uploads/2017/07/Motiv-06.jpg”]
Contact our Service team
Make sure you’re not the next victim! Don’t wait for the next shock headlines – act now! Contact our Service specialists today.
[ot-caption title=”Our service team” url=”https://www.yokogawa.com/eu/blog/chemical-pharma/app/uploads/2017/06/Serviceteam-Yokogawa.jpg”]
If you’d like to learn more about “Security”, please read the following blog posts: