IT security: NIS-2 makes it a top priority

IT security: NIS-2 makes it a top priority
Advertising

Share post

Only in a quarter of German companies do management take responsibility for IT security. This is especially the case in smaller companies. The larger the company, the less often the bosses feel responsible.

Whether small and medium-sized companies or corporations: In only 25 percent of German companies does the management take responsibility for IT security. This is proven by the representative study “Cybersecurity in Numbers” by G DATA CyberDefense AG, Statista and brand eins.

Advertising

Cyber ​​attacks on companies and institutions cause high costs and illustrate the importance of extensive IT security measures. With the NIS 2024 guideline coming into force in October 2, the executive floor is no longer allowed to delegate IT security.

NIS-2 increases the pressure and makes management responsible

Should IT security be a top priority? Definitely! Due to the increasing digitalization of work and production processes in companies, cybersecurity is no longer a sideshow and should be a top priority for company management. Cyber ​​attacks are very expensive and quickly become life-threatening. According to the representative study “Cybersecurity in Numbers” by G DATA CyberDefense, Statista and brand eins, management most often transfers responsibility for security precautions against cyberattacks to the IT department. In only a quarter of German companies, management sees the need to be responsible for implementing and maintaining protective measures themselves. With NIS-2 at the latest, the pressure on many board members will increase and they will be legally obliged to take the issue of IT security seriously. If they fail to comply, they may also be held personally liable.

Advertising

Subscribe to our newsletter now

Read the best news from B2B CYBER SECURITY once a month



By clicking on "Register" I agree to the processing and use of my data in accordance with the declaration of consent (please open for details). I can find more information in our Privacy. After registering, you will first receive a confirmation email so that no other person can order something you don't want.
Expand for details on your consent
It goes without saying that we handle your personal data responsibly. If we collect personal data from you, we process it in compliance with the applicable data protection regulations. Detailed information can be found in our Privacy. You can unsubscribe from the newsletter at any time. You will find a corresponding link in the newsletter. After you have unsubscribed, your data will be deleted as soon as possible. Recovery is not possible. If you would like to receive the newsletter again, simply order it again. Do the same if you want to use a different email address for your newsletter. If you would like to receive the newsletter offered on the website, we need an e-mail address from you as well as information that allows us to verify that you are the owner of the e-mail address provided and that you agree to receive the newsletter. Further data is not collected or only collected on a voluntary basis. We use newsletter service providers, which are described below, to process the newsletter.

CleverReach

This website uses CleverReach to send newsletters. The provider is CleverReach GmbH & Co. KG, Schafjückenweg 2, 26180 Rastede, Germany (hereinafter “CleverReach”). CleverReach is a service that can be used to organize and analyze the sending of newsletters. The data you enter for the purpose of subscribing to the newsletter (e.g. email address) will be stored on the CleverReach servers in Germany or Ireland. Our newsletters sent with CleverReach enable us to analyze the behavior of the newsletter recipients. This can include It is analyzed how many recipients have opened the newsletter message and how often which link in the newsletter was clicked. With the help of so-called conversion tracking, it can also be analyzed whether a previously defined action (e.g. purchase of a product on this website) took place after clicking on the link in the newsletter. Further information on data analysis by CleverReach newsletter is available at: https://www.cleverreach.com/de/funktionen/reporting-und-tracking/. The data processing takes place on the basis of your consent (Art. 6 Para. 1 lit. a DSGVO). You can revoke this consent at any time by unsubscribing from the newsletter. The legality of the data processing operations that have already taken place remains unaffected by the revocation. If you do not want an analysis by CleverReach, you must unsubscribe from the newsletter. For this purpose, we provide a corresponding link in every newsletter message. The data you have stored with us for the purpose of subscribing to the newsletter will be stored by us or the newsletter service provider until you unsubscribe from the newsletter and deleted from the newsletter distribution list after you have canceled the newsletter. Data stored by us for other purposes remain unaffected. After you have been removed from the newsletter distribution list, your e-mail address may be stored by us or the newsletter service provider in a blacklist if this is necessary to prevent future mailings. The data from the blacklist is only used for this purpose and is not merged with other data. This serves both your interest and our interest in complying with the legal requirements when sending newsletters (legitimate interest within the meaning of Art. 6 Para. 1 lit. f GDPR). Storage in the blacklist is not limited in time. You may object to the storage if your interests outweigh our legitimate interest. For more information, see the privacy policy of CleverReach at: https://www.cleverreach.com/de/datenschutz/.

Data processing

We have concluded a data processing agreement (DPA) for the use of the above-mentioned service. This is a contract mandated by data privacy laws that guarantees that they process personal data of our website visitors only based on our instructions and in compliance with the GDPR.

“IT security is by law a top priority,” explains Tim Berghoff, Security Evangelist at G DATA CyberDefense. “The NIS 2 guideline also makes management directly responsible and no management or board can shift this responsibility. If those responsible do not take the implementation and monitoring of IT security measures seriously, they are personally liable and violations also result in high fines.”

Small business leaders are more likely to make IT security a priority

The exclusive survey also shows that the larger a company is, the less responsibility lies with top management. Only one in ten companies with 1.000 or more employees has management responsible for IT security. This is fatal with regard to NIS-2. And time is running out. What is surprising, however, is that in 40 percent of small companies with fewer than 50 employees, responsibility for IT security already lies with the management or board of directors. Nevertheless, there is also an acute need to catch up among small companies, because in three out of five small companies IT security is not yet a top priority. There is an urgent need to catch up on this because the boardroom plays a key role in establishing a safety culture in the company.

Study "Cyber ​​Security in Numbers"

“Cybersecurity in Numbers” is characterized by a high level of information density and particular methodological depth: Statista’s researchers and market researchers have brought together numbers, data and facts from more than 300 statistics into a unique complete work. More than 5.000 employees in Germany were surveyed as part of a representative online study on cybersecurity in professional and private contexts. The experts at Statista closely monitored the survey and, thanks to a sample size that is well above the industry standard, are able to present reliable and valid market research results in the “Cybersecurity in Numbers” issue.

What does the NIS 2 directive mean for companies?

With NIS-2 (“Network and Information Security” Directive), security standards will apply across the EU for many companies and organizations in 18 critical sectors from October 2024, 18. This is intended to ensure a higher and uniform level of IT security in the EU. Highly critical sectors such as energy and public administration are particularly affected, but also providers who produce, process and sell food, for example.

More at GData.de

 


About G Data

With comprehensive cyber defense services, the inventor of the anti-virus enables companies to defend themselves against cybercrime. Over 500 employees ensure the digital security of companies and users. Made in Germany: With over 30 years of expertise in malware analysis, G DATA conducts research and software development exclusively in Germany. The highest standards of data protection are paramount. In 2011, G DATA issued a “no backdoor” guarantee with the “IT Security Made in Germany” seal of trust from TeleTrust eV. G DATA offers a portfolio from anti-virus and endpoint protection to penetration tests and incident response to forensic analyzes, security status checks and cyber awareness training to defend companies effectively. New technologies such as DeepRay use artificial intelligence to protect against malware. Service and support are part of the G DATA campus in Bochum. G DATA solutions are available in 90 countries and have received numerous awards.


 

Matching articles on the topic

Risk Identities: When companies lose track

In companies, there are more than 80 machine identities for every human identity. This means that two-thirds of German companies ➡ Read more

Cyber ​​defense with AI: 3 out of 4 companies already use it 

AI is already at the forefront of cyber defense: 74 percent of German companies are already using AI in cyber defense ➡ Read more

Are companies prepared for quantum-enabled cyberattacks?

Q-Day is becoming a real threat. The new report shows how companies are preparing. "Q-Day" refers to the day on which ➡ Read more

Ransomware extortion: Almost every second company pays

The new "State of Ransomware 2025" report from Sophos confirms an average ransom payment of $1 million (€869.591). What's new is, ➡ Read more

The Data Act is just around the corner

In just over 60 days, companies must have implemented the Data Act – but the vast majority of ➡ Read more

Cybersecurity in procurement: cost pressure and lack of standards

Cybersecurity: The biggest structural deficits lie in the standardization of security criteria and the strategic weighting of security over costs. ➡ Read more

Report: Russia intensifies cyberattacks

The new APT Activity Report shows that Russia is increasingly intensifying its cyberattacks. The report from ESET shows current campaigns ➡ Read more

DORA: Creating digital security in the financial sector

The European regulations DORA and NIS2 require the development of a digital security culture. For the financial industry, this means that it must take measures ➡ Read more