{"id":6738,"date":"2017-02-01T15:27:35","date_gmt":"2017-02-01T14:27:35","guid":{"rendered":"https:\/\/magazine.swissinformatics.org\/?p=6738\/"},"modified":"2022-07-02T14:39:51","modified_gmt":"2022-07-02T12:39:51","slug":"erfolgreiche-cyberangriffe","status":"publish","type":"post","link":"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/","title":{"rendered":"Security by Design"},"content":{"rendered":"<p>Almost 90% of successful cyber attacks start with phishing attacks \/ social engineering e.g. via email and the malware activated and spread via this e.g. ransomware, encryption Trojans, spyware.\u00a0-&gt; With now easily controllable and automated cloud services such as Office365, email signing, email encryption, managed mail security, managed security, cloud backup, this greatest attack security risk can be massively reduced with a relatively small budget.<\/p>\n<p>The unchanged most important basis for such cleverly combined, orchestrated services or countermeasures are current, correctly set up and continuously updated operating systems and endpoint protection services such as virus protection, anti-malware, monitoring, baseline analyzer. -&gt; Here, too, proactive and centrally manageable solutions have been available for a long time, such as well-coordinated policies (GPO, users, computers, network, servers, firewall) Microsoft Enterprise Mobility &amp; Security, behavior monitoring, sandboxing, baselining based on behavior pattern measures and cloud overall solutions.<\/p>\n<p>60% of the data loss with company vital risks, which also endangers reputation, is caused by theft.\u00a0-&gt; By means of very well combinable cloud services such as document rights management DRM, email encryption, encrypted data exchange via SharePoint \/ OneDrive, cloud backup and cloud overall solutions, this risk of the increasing threat situation can also be reduced to a minimum.<\/p>\n<p>The focus of cyber risks \/ cyber war remains on people \/ employees as the target. However, people \/ employees can also be involved as active participants in proactive support against ICT risks. This can be done by means of sensitization, training and also by means of an ICT security policy (which can also be submitted as a binding annex to the employment contract). .<\/p>\n<p>With such combined measures, it is already possible to implement a &#8220;Security by Design&#8221; \/ &#8220;Security by Default&#8221; overall solution which is then also compliant with the future Swiss Data Protection Act (DSG), which is currently being consulted on, or within European data protection. Further requirements \/ compliance specifications, e.g. also from FINMA, ICS, risk management &#8211; or according to the obligations along the ICT company strategy &#8211; are supported by such preventive measures in a meaningful and budgetable way.<\/p>\n<p>&#8220;Make or buy&#8221; decisions in the area of such managed security services have become relatively simple. For example, there are internationally active service providers with thousands of security specialists with 7x24h operations \/ operation centers \/ response centers. The billions invested in the global security aspects of critical infrastructures (supported with Artificial Intelligence AI, technology alliances) allow an affordable use of such enterprise solutions even for SMEs and micro enterprises due to &#8220;economy of scale&#8221; effects.<\/p>\n<p>In addition, you may find further useful inputs and hopefully impulse-bringing thoughts here.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Almost 90% of successful cyber attacks start with phishing attacks \/ social engineering e.g. via email and the malware activated and spread via this e.g. ransomware, encryption Trojans, spyware.\u00a0-&gt; With now easily controllable and automated cloud services such as Office365, email signing, email encryption, managed mail security, managed security, cloud backup, this greatest attack security [&hellip;]<\/p>\n","protected":false},"author":373,"featured_media":6753,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1244,354,355],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security by Design - SI Digital Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security by Design - SI Digital Magazine\" \/>\n<meta property=\"og:description\" content=\"Almost 90% of successful cyber attacks start with phishing attacks \/ social engineering e.g. via email and the malware activated and spread via this e.g. ransomware, encryption Trojans, spyware.\u00a0-&gt; With now easily controllable and automated cloud services such as Office365, email signing, email encryption, managed mail security, managed security, cloud backup, this greatest attack security [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/\" \/>\n<meta property=\"og:site_name\" content=\"SI Digital Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-01T14:27:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-02T12:39:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/02\/Feature_Image_PrivacySecurity_2_16-9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"454\" \/>\n\t<meta property=\"og:image:height\" content=\"255\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fridel Rickenbacher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:site\" content=\"@SIGesellschaft\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fridel Rickenbacher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/\"},\"author\":{\"name\":\"Fridel Rickenbacher\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e\"},\"headline\":\"Security by Design\",\"datePublished\":\"2017-02-01T14:27:35+00:00\",\"dateModified\":\"2022-07-02T12:39:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/\"},\"wordCount\":437,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"articleSection\":[\"\u2022 Viewpoint \u2022\",\"Society\",\"Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/\",\"name\":\"Security by Design - SI Digital Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\"},\"datePublished\":\"2017-02-01T14:27:35+00:00\",\"dateModified\":\"2022-07-02T12:39:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/magazine.swissinformatics.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security by Design\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#website\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"name\":\"SI Digital Magazine\",\"description\":\"Articles from the Swiss Informatics Society (Blog)\",\"publisher\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#organization\",\"name\":\"Swiss Informatics Society\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"contentUrl\":\"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg\",\"width\":1441,\"height\":1081,\"caption\":\"Swiss Informatics Society\"},\"image\":{\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts\",\"https:\/\/twitter.com\/SIGesellschaft\",\"https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e\",\"name\":\"Fridel Rickenbacher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g\",\"caption\":\"Fridel Rickenbacher\"},\"description\":\"Fridel Rickenbacher ist Mitbegr\u00fcnder, DPO CISO und Verwaltungsrat der MIT-GROUP f\u00fcr \u00abEmpowering for the 4th Industrial Revolution\u00bb. Redaktion SwissICT.ch und Experten-Gruppen in den Bereichen CyberSecurity, Privacy, Auditing, Information Ethics, digitale Gesellschaft u.a.\",\"url\":\"https:\/\/magazine.swissinformatics.org\/en\/author\/fridel\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security by Design - SI Digital Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/","og_locale":"en_US","og_type":"article","og_title":"Security by Design - SI Digital Magazine","og_description":"Almost 90% of successful cyber attacks start with phishing attacks \/ social engineering e.g. via email and the malware activated and spread via this e.g. ransomware, encryption Trojans, spyware.\u00a0-&gt; With now easily controllable and automated cloud services such as Office365, email signing, email encryption, managed mail security, managed security, cloud backup, this greatest attack security [&hellip;]","og_url":"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/","og_site_name":"SI Digital Magazine","article_publisher":"https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","article_published_time":"2017-02-01T14:27:35+00:00","article_modified_time":"2022-07-02T12:39:51+00:00","og_image":[{"width":454,"height":255,"url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/02\/Feature_Image_PrivacySecurity_2_16-9.jpg","type":"image\/jpeg"}],"author":"Fridel Rickenbacher","twitter_card":"summary_large_image","twitter_creator":"@SIGesellschaft","twitter_site":"@SIGesellschaft","twitter_misc":{"Written by":"Fridel Rickenbacher","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/#article","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/"},"author":{"name":"Fridel Rickenbacher","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e"},"headline":"Security by Design","datePublished":"2017-02-01T14:27:35+00:00","dateModified":"2022-07-02T12:39:51+00:00","mainEntityOfPage":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/"},"wordCount":437,"commentCount":0,"publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"articleSection":["\u2022 Viewpoint \u2022","Society","Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/","url":"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/","name":"Security by Design - SI Digital Magazine","isPartOf":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#website"},"datePublished":"2017-02-01T14:27:35+00:00","dateModified":"2022-07-02T12:39:51+00:00","breadcrumb":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/magazine.swissinformatics.org\/en\/erfolgreiche-cyberangriffe\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/magazine.swissinformatics.org\/en\/"},{"@type":"ListItem","position":2,"name":"Security by Design"}]},{"@type":"WebSite","@id":"https:\/\/magazine.swissinformatics.org\/en\/#website","url":"https:\/\/magazine.swissinformatics.org\/en\/","name":"SI Digital Magazine","description":"Articles from the Swiss Informatics Society (Blog)","publisher":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/magazine.swissinformatics.org\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/magazine.swissinformatics.org\/en\/#organization","name":"Swiss Informatics Society","url":"https:\/\/magazine.swissinformatics.org\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/","url":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","contentUrl":"https:\/\/magazine.swissinformatics.org\/wp-content\/uploads\/2017\/11\/SI_KeyImage_4to3.jpg","width":1441,"height":1081,"caption":"Swiss Informatics Society"},"image":{"@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/www.swissinformatics.org\/?fref=ts","https:\/\/twitter.com\/SIGesellschaft","https:\/\/www.youtube.com\/channel\/UCYUEr1Qkbri9GDTa84z415g"]},{"@type":"Person","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/d91ec7e916aec5aa29446429cb30a02e","name":"Fridel Rickenbacher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/magazine.swissinformatics.org\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b77c2a771a27a1d05f0432a015e8cc54?s=96&d=mm&r=g","caption":"Fridel Rickenbacher"},"description":"Fridel Rickenbacher ist Mitbegr\u00fcnder, DPO CISO und Verwaltungsrat der MIT-GROUP f\u00fcr \u00abEmpowering for the 4th Industrial Revolution\u00bb. Redaktion SwissICT.ch und Experten-Gruppen in den Bereichen CyberSecurity, Privacy, Auditing, Information Ethics, digitale Gesellschaft u.a.","url":"https:\/\/magazine.swissinformatics.org\/en\/author\/fridel\/"}]}},"_links":{"self":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/posts\/6738"}],"collection":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/users\/373"}],"replies":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/comments?post=6738"}],"version-history":[{"count":0,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/posts\/6738\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/media\/6753"}],"wp:attachment":[{"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/media?parent=6738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/categories?post=6738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/magazine.swissinformatics.org\/en\/wp-json\/wp\/v2\/tags?post=6738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}