The most recent examples show how vulnerable the IT infrastructures of German companies are: The baby food manufacturer Hipp from Pfaffenhofen an der Ilm fell victim to an external cyber attack; In addition to the communication channels, the attack affected production at the Pfaffenhofen headquarters.

The daily newspaper “ Heilbronner Stimme ” has not been able to appear as a printed edition since the beginning of last week, the reason being a hacker attack on production.

port in Bremerhaven is hit even more drastically : the IT here fends off up to 10,000 attacks every day.

“In addition to the normal attacks to extort money through ransomware, we are seeing increasing attacks that are specifically aimed at sabotage. The sole aim is to completely paralyze a company’s production and cause damage to the economy,” says Andreas Besser, Managing Director of Telonic.

The system house, headquartered in Cologne, secures networks for medium-sized and large companies and operates its own Security Network Operation Center. There, our own staff and extensive experience as well as the latest tools ensure safety and appropriate support in the event of an emergency.

70 percent of companies do not have enough protection

The attacks take place internationally; the criminal groups are based in North Korea, China, Eastern Europe and many other countries. Meanwhile, the level of attacks has increased dramatically, especially since the outbreak of war in Ukraine and the aid deliveries from Europe and the USA.

“The intensity of the attacks will intensify at the end of the year - and according to our estimates, around 70 percent of companies are not adequately protected against attacks. Your own IT is simply overwhelmed by hacking as a war tactic. For those who feel safe, examples like Hipp with 3,500 employees show how quickly you can be affected. Medium-sized businesses are extremely vulnerable here due to their traditional IT structures,” warns Telonic boss Besser.

According to the latest findings, his company is combining IT security and the network - creating a Fort Knox that makes an attack much more difficult. Telonic migrates security to the cloud and makes it available via a Cloud Area Network (CAN). This technology is also known as Secure Access Service Edge (SASE) and is considered the network and security model of the future.

Safety not as an extra, but as standard equipment

Security becomes an integral part of a network - regardless of where access takes place: This means that the model is not only ideal for companies with a lot of home office use, it also allows you to reduce your own on-site hardware to a minimum.

“There needs to be a rethink: IT security is no longer an extra that you book in different packages like when ordering a new car. “Security has to be standard equipment today, otherwise companies face extinction,” describes Andreas Besser from Telonic.

The proprietary CAN model also works regardless of where the server capacities are hosted: whether on-prem, in cloud or multi-cloud environments - the Cloud Area Network (CAN) ensures the highest level of security across all environments. Telonic's managed service provides comprehensive service around the clock, seven days a week, if desired. This covers all possible company connections – from MPLS, VPN, SD-WAN to RAS. CAN is also compatible with almost all existing environments and, in combination with the desired security, provides a cloud-based all-round solution.

source

Press release: Telonic GmbH / Attention, hackers: The danger is higher than ever.
Small and medium-sized businesses must ensure security - IT security is no longer an extra feature
Also read our report on the topic: Ukraine War: How cyber crime is being used as a weapon


If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:

📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.

Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!

* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!


Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )