New BSI cyber security network with experts

B2B Cyber ​​Security ShortNews

Share post

The cyber security network with experts, newly established by the BSI as a pilot project, is intended to increase the level of cyber security in Germany. Small and medium-sized companies in particular should benefit from this.

A cyber security network was set up in a recently started, 6-month pilot project in the greater Bonn area. It is a voluntary association of qualified experts who provide their know-how to resolve IT security incidents and thus help to improve the IT security situation in Germany. The whole thing is similar to the Alliance for Cyber ​​Security platform initiated by the Federal Office for Information Security (BSI). Above all, small and medium-sized companies that do not have sufficiently trained staff on the subject of cyber security benefit from this.

Experts as a contact point for companies

If unauthorized persons gain access to a company's digital systems, the consequences - such as data leakage, blackmail attempts or even short or long-term IT failures - can cause enormous damage to the company. This is exactly what companies that have no resources to defend against are exposed to defenselessness.

The new cyber security network is intended to remedy this and be a first point of contact for those affected. The so-called "digital rescue chain" offers 5 levels of help:

  1. There are first written guidelines that can be found on the BSI website. These provide initial impulses and simple assistance for those affected by cyber attacks or IT malfunctions. Trained people may find them sufficient to help them help themselves.
  2. A free hotline (0800-274 1000) can also be reached daily from 8 a.m. to 18 p.m. and helps those affected to correctly assess the attack / disruption and initiate appropriate countermeasures.
  3. Digital first aiders step in when necessary if there are minor security incidents or IT malfunctions.
  4. Incident experts, on the other hand, are IT specialists certified by the BSI, who may even offer on-site assistance.
  5. And finally there are IT security service providers in the network who have also been certified by the BSI and provide entire teams when it comes to major cyber attacks or complex security issues.

Overall, the BSI hopes to use this pilot project to lay the foundation for an increased level of cyber security that should be accessible throughout Germany in the long term. K3 Innovations GmbH, digital agency and internet service provider based in Düren - and thus within the scope of the pilot project - has also registered to participate in the network.

More at K3-Innovationen.com

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more