Many people are worried about the security of IT systems in Germany because of Russia's war against Ukraine. Dominik Bredel, IT security expert at the IBM spin-off Kyndryl, has five tips for more IT security that each and every one of us can implement immediately.
In view of the war in Ukraine, 81 percent of Germans fear that their data is not safe on the Internet. But only 33 percent take additional security measures. Dominik Bredel, security expert at Kyndryl, the world's largest provider of IT infrastructure, names five simple but effective measures that we can all do to increase cybersecurity in Germany.
In 85 percent of all cyber security incidents, a human made a mistake. 94 percent of all hacker programs arrive via email . The consequences of successful attacks range from unnoticed data theft to business losses to completely blocked company networks, which can be rendered unusable.
And something even worse is in the offing: The Federal Office for Information Security (BSI) is warning of hacker attacks on so-called critical infrastructures, such as electricity suppliers or hospitals, due to the war. Such attacks could also endanger human lives in this country.
IT security is therefore more important than ever. Many people are currently asking themselves: What can I personally do to protect the networks that I use privately and professionally?
5 basic tips
These are the five basic tips from IT security expert Dominik Bredel for more security on the Internet - demonstrably effective, surprisingly simple and immediately implementable:
1. Think first, then click
This basic rule has saved many people from unintentionally causing serious harm. Only open a message or attachment if you are sure the sender is real. Don't click on any link sent to you - type the address yourself into your browser window or go to your favorites. Do not start programs that come via email, WhatsApp or SMS.
Attackers try to make messages sound as real as possible. But there are often inconsistencies that make us pause. For example, if the expression is not consistent or the content is not really clear. Any kind of urgency, any request to act immediately, is also suspicious. If our gut feeling warns us, we should always take it seriously! If in doubt, ask the sender (using the contact details in your address book or a website you googled yourself - not the details in the signature of the suspicious email or using the reply function).
The basic rule “think first, then click” also applies in the App Store. Hackers often use app names with small differences from the original.
2. Set up strong passwords
We've all heard it a thousand times - but too few people stick to it. Use strong passwords – a different one for each account. A strong password contains at least 10 characters and consists of a mix of lower and upper case letters, numbers and special characters. A password like this is almost impossible to crack! A difficult password that you write down is better than an easy password that you remember. Because the account with the written password can be accessed by your own family - the account with a simple password can be accessed by the whole world.
The best thing to do is set up an automatic password manager. This will suggest secure passwords, store them and use them for you when you log in.
3. Use two-factor authentication
A difficult word for a simple but powerful action. With two-factor authentication, you don't just enter a password, you also use a second method to confirm that you are really yourself. For example, by receiving a text message on your cell phone with a number that you then type into the registration form.
A hacker who wants to break into your private or professional network on your behalf would not only have to know your password. But also get your cell phone.
4. Install updates
PC, cell phone and tablet are best protected if you install all operating system updates. So please don’t click on “Try later” – instead click “Install now”.
5. Enable security features
The operating system's firewall and virus scanner should be turned on and always up to date. Sounds obvious - but it's not. It's best to quickly check what your settings are like!
Sources:
Ukraine War: Fear of fake news and cyber war
Assessment of the current cyber security situation in Germany after the Russian attack on Ukraine (BSI)
About Kyndryl
Kyndryl (NYSE “KD” @kyndryl) is the world's largest provider of IT infrastructure services. The company designs, builds, manages and modernizes the complex, mission-critical information systems that the world relies on every day. Kyndryl's nearly 90,000 employees serve over 4,000 customers in more than 60 countries around the world, including three-quarters of the Fortune 100 companies.
For more information, visit www.kyndryl.com .
If you enjoyed this post and value the importance of well-founded information, become part of the exclusive Mimikama Club! Support our work and help us promote awareness and combat misinformation. As a club member you receive:
📬 Special Weekly Newsletter: Get exclusive content straight to your inbox.
🎥 Exclusive video* “Fact Checker Basic Course”: Learn from Andre Wolf how to recognize and combat misinformation.
📅 Early access to in-depth articles and fact checks: always be one step ahead.
📄 Bonus articles, just for you: Discover content you won't find anywhere else.
📝 Participation in webinars and workshops : Join us live or watch the recordings.
✔️ Quality exchange: Discuss safely in our comment function without trolls and bots.
Join us and become part of a community that stands for truth and clarity. Together we can make the world a little better!
* In this special course, Andre Wolf will teach you how to recognize and effectively combat misinformation. After completing the video, you have the opportunity to join our research team and actively participate in the education - an opportunity that is exclusively reserved for our club members!
Notes:
1) This content reflects the current state of affairs at the time of publication. The reproduction of individual images, screenshots, embeds or video sequences serves to discuss the topic. 2) Individual contributions were created through the use of machine assistance and were carefully checked by the Mimikama editorial team before publication. ( Reason )

