News

17.10.2017

Nine Steps to Cyber Security

How does effective protection against cyberattacks work? The ZVEI checklist provides orientation.

Entrepreneurs have to take care of customers and employees, develop strategies and open up markets, control budgets and communication - there is not much time to worry about details. Experts are needed. But the entrepreneur should set the framework for their work himself. The questions in the ZVEI checklist provide orientation:

 

  1. Do you have a safety and risk analysis carried out at regular intervals? Do you discuss the results in the Executive Board / in the management?
  2. Have you appointed a "Chief Security Officer (CSO)" - ideally outside the IT department - who is responsible for security? If the company is too small: Have you contracted a specialized service provider?
  3. What is the proportion of the IT budget used for IT security? Is it in the range of the standard value of ten percent?
  4. Is your company directly or through service providers involved in an experience and exchange network for cyber security incidents? Are there contacts to the German Federal Office for Information Security (BSI), ZVEI or the Alliance for Cyber Security?
  5. Are there simple, understandable rules for the use of IT systems in your company? Are your employees made aware of the dangers of cybercrime and trained at least once a year? 
  6. Is there a defined emergency plan, in  in case of a malfunction of relevant components of information and communication technology? Is the emergency situation played through regularly?
  7. What is your concept for physical data backup and the creation of backups? Is it regulated which data is made available for cloud applications and which is not?
  8. Is a defined rights and role management system in place to determine which employee is authorized to access which data and programs? Does your IT have a log-in system that records who accesses what and when - without any data protection concerns?
  9. Do you regularly talk to your customers and especially to your own suppliers about cyber security in products and solutions? How do you ensure that the delivered products that you use or process yourself have no serious weak points?

You may also be interested in:

Further

Most visited pages

Publications

Read more

Industrie 4.0

Read more

Mobility

Read more

Energy

Read more

Subjects

Read more

DC-INDUSTRIE

Energiewende meets Industrie 4.0

Together with its partners in the DC-INDUSTRIE project, ZVEI is developing network management options for the future. The motto:...

5G-ACIA

Designing 5G for Industrial Use

5G allows machines to communicate with each other in real time, saving resources and energy through Edge Computing and Massive...

ZVEI explains Supply Chain Management

Electronic supply chains are complex. This is why it is of importance to manage their complexity well. The PROS definiton...

ZVEI explains RAMI 4.0 (Chinese subtitles)

To create a uniform basis for Industrie 4.0, ZVEI has teamed up with its partners to develop RAMI 4.0, the reference architecture...

Implementing Industrie 4.0: This is how it works!

Industrie 4.0 is no longer just a theory, the practice is now being applied in many German businesses. The demands of a global...