EU Cyber ​​Resilience Act: Guide against risks and fines

EU Cyber ​​Resilience Act: Guide against risks and fines

Share post

The theft of data, digital blackmail, espionage and sabotage caused damage to the German economy of around 2022 billion euros in 203. The EU Commission's EU Cyber ​​Resilience Act (CRA) is a legal obligation to improve product cybersecurity across the European Union. A free guide helps to better recognize future legal obligations and to avoid possible risks and fines

Cyber ​​threats are one of the biggest risks for companies and the economy as a whole and have caused enormous damage in recent months. According to the “Wirtschaftsschutz 2022” study by the industry association BITKOM more than 2022% of all companies reported a cyber incident in 80 - a further significant increase is feared for this year.

Industry Guide

The challenges for companies when implementing the new regulation are high - there is often a lack of processes and solutions: "Companies and distributors of products with digital elements often have an insufficient understanding of how the CRA can be implemented. Internal IT departments are sometimes overwhelmed, and investments in cyber security are becoming increasingly important. For us, secure software supply chains are in the foreground - if there is a maximum of security here, hackers have little chance in the end," says Jan Wendenburg, Managing Director of ONEKEY.

The company, which specializes in product cyber security, is therefore presenting a free guide that goes into detail about the regulation and the resulting necessary implementation steps. Risks and fines can thus be averted and comprehensive protection can be provided with high cost efficiency. Interested companies can download the free CRA guide here.

Importers, distributors, manufacturers: the new obligations affect everyone

While it may be some time before the new regulation comes into force, all manufacturers should act now due to multi-year product design, development and production cycles. In order to meet the European Union requirements set out in the EU Cyber ​​Resilience Act for product safety and incident reporting, all manufacturers as well as importers and distributors that market their products in the European Union must assess the cyber resilience of their products to ensure.

The entire supply chain of a product is affected - i.e. also supplied components with built-in software/firmware components. “A software bill of materials, the so-called software bill of materials (SBOM), provides a crucial basis for meeting the requirements comprehensively and gaining knowledge of which software components are contained in an end product. Currently, the processes for this are hardly implemented in many companies," explains Jan Wendenburg from ONEKEY.

More at ONEKEY.com

 


About ONEKEY

ONEKEY (formerly IoT Inspector) is the leading European platform for automatic security & compliance analyzes for devices in industry (IIoT), production (OT) and the Internet of Things (IoT). Using automatically created "Digital Twins" and "Software Bill of Materials (SBOM)" of the devices, ONEKEY independently analyzes firmware for critical security gaps and compliance violations, without any source code, device or network access.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more