Unabhängiges Magazin für Wirtschaft und Bildung

26. April 2024

Search form

Search form

Security and up-to-dateness as a standard in data management

Security and up-to-dateness as a standard in data management© piqs.de/b max

The increasing occurrences of cyber-crime and the massive increase in information data demand adequate measures.

The variety and speed of technological applications in companies are increasing, but current events also show an increase in security incidents. Studies show that companies need an average of 150 days to detect cyber attacks. Especially cases with security loopholes and malicious software becoming more complex. Corresponding defence systems therefore focus not only on the areas of protection (protection) and prevention (prevention), but primarily the discovery (detection) and rapid response (respond).

Individual security defence concepts
IT service providers such as Kapsch BusinessCom are now reacting with their own defence concepts, called managed defence services. The first approach is the operational network, where an attacker and protective measures are identified by means of an automated monitoring. If a critical attack occurs, then its dispersion through internal processes must be prevented. The key point here is also the integration of the increasing dial-up processes (LogIn) via mobile devices.
At the Red Cross in Lower Austria, for example, potential threats are continuously evaluated with appropriate proprietary technologies, including ongoing audits. The next step is the management of access rights and mobile devices as well as the protection of network, content and applications, as well as the real fight against attacks and forensic analysis. "Security concerns, in addition to enterprises, also institutions that equal the attack areas of large companies with their ever-growing, often heterogeneous IT landscapes", says Christian Üblbacher, Head of Security Solutions at Kapsch BusinessCom.

Big Data in a security-critical context
The management of data is also part of the topic of technological solutions in this security-critical context. The company is now aware of the potential for storage and use of customer data. This finding is expressed in the term "big data". In order for the work and use of data to have an effect, companies must be able to rely on quality and correctness. This applies in particular to personal contact data, such as mobile numbers, which are frequently exchanged. AT present, only one in every third household has a fixed line connection, statistically, while nearly every Austrian carries 2 SIM cards with them and when asked for their telephone number the answer will be with high probability a mobile number.
For companies with extensive customer contacts, such as market researchers, donor organizations or financial service providers, the up-to-dateness is also relevant accordingly. This also includes the possibility to check the mere existence of mobile numbers. For example, a German collection agency has automated number verification integrated into the SMS contact processes. "Whether the number still belongs to Mr. Sampleman cannot be determined, but the pure existence of the number quite easily, and this difference can cause increases of several 100 Euros per contact in the business processes", explains Martin Schuster of websms.

Links

red/czaak; translation by economy, Economy Ausgabe Webartikel, 04.04.2017