Cyberattacks on companies and their IT systems are continuing to rise and are generally associated with high costs. According to a study by PwC, 2014 saw almost 43 million security incidents worldwide, which corresponds to roughly 117,000 incidents per day. Cyberattacks can generally hit enterprises of any size. TÜV SÜD has now published a white paper which provides an overview of the regulatory differences in the major markets and industries and shows the importance of developing an IT security strategy aligned to the relevant requirements.
The development of the digital world is accompanied by new security-related challenges. Given this, companies should be aware of the vital necessity of developing a comprehensive and effective IT security strategy and keeping it up to date. Frequent mistakes include restricting protection to the areas most likely to be targeted by a cyberattack, such as online payment systems, or only providing solutions for existing threats while ignoring new threats developed by hackers. In fact, small- and medium-sized enterprises are at even higher risk as they generally invest less in IT security, making their IT infrastructure less secure than that of large corporations.
However, all companies – large or small – must be aware of the risks involved in digitisation, the consequences of these risks and potential strategies for countering them. In addition, companies operating at global level, particularly companies in the field of critical infrastructures, must know, and be in a position to comply with, the increasing regulations in the fields of data protection and IT security. Last but not least, they should know why an IT security strategy is so important and what steps are required to implement the strategy.
To cater to these needs, TÜV SÜD has published a free “IT Security of Critical Infrastructure” white paper which addresses these essential aspects.
The “IT Security of Critical Infrastructure” white paper, published in English, is available for free download at www.tuv-sud.com/whitepaper/itsecurity.
Press contact: Carolin Eckert