Dr Christian Schwartz on information security and what we can learn from incidents like WannaCry.
22. June 2017

Christian, as a consultant in information security, it’s important that you pay close attention to current security incidents. Why’s that?
That’s right. Apart from our consulting services for companies, we closely observe incidents in the IT security environment. We especially follow up on and analyse successful attacks, such as the latest example of WannaCry.
Genau wie von unseren Kollegen im Bereich Security Analysis & Pentest im Übrigen. Dort allerdings mehr aus technischer Sicht.
Why do those analyses play such an important role for your consultation services?
Our department focuses on the holistic integration of IT security into corporate processes. Apart from technology, processes and people play a crucial role in that context. Large scale attacks, such as WannaCry, usually target multiple of those areas. Our work is about figuring out how such an attack could have been prevented so we can protect our clients from similar attacks in the future. For this purpose we reconstruct how the attack could be carried out successfully.
What conclusions could you draw from this case?
The attack mainly showed us how vulnerable IT systems are and that in some companies IT security unfortunately still only plays a minor role. After all, the infection with the malicious code did not necessarily have to assume the proportions it did. That’s why my brief article on “WannaCry” is subtitled “A Wake-Up Call for Information Security.”
Read the full article.

Also interesting:

3 Reasons for a Cloud Security Audit

3 Reasons for a Cloud Security Audit

Outsourcing applications and data to the cloud brings significant benefits for companies, but at the same time also new challenges for the corresponding IT departments. The technologies and processes of a cloud environment differ from those of local data centers....

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

usd HeroLab Top 5 Vulnerabilities 2020: SMB 1.0 & SMB Signing

During penetration tests our security analysts repeatedly uncover gateways in IT systems and applications that pose significant risks to corporate security. They increasingly identify the same vulnerabilities in different IT assets, some of which have been known for...

Categories

Categories