Me

Cyberattacks are on the rise – even on German companies!

Fabian Niedermayr
Reading time: 5 min
3. April 2023
Security Schriftzug

The industry association for the German information and telecommunications sector Bitkom puts the financial loss from cyberattacks, blackmail software and malware for the domestic economy alone at an unimaginable 200 billion euros in 2022. This is because, on the one hand, attacks are increasing with rising user numbers (not only on cloud solutions). On the other hand, the international IT security situation has become even more acute since the war in Ukraine.

What are politics doing to counter the increasing threats?

One measure to assess and strengthen the cybersecurity situation in Germany is to promote cooperation between politics, industry and science. Every year, the Potsdam Conference on National CyberSecurity brings together representatives from the German Bundeswehr, the German Foreign Office, and the ministries of education and research, digital affairs and transport, and other relevant areas. Topics range from critical infrastructure protection and industry to information warfare and fake news to employee awareness.

How can companies protect themselves?

Enterprises, SMEs and government agencies need and want their sensitive data to be well protected. It is not only confidential documents such as plans, statements, invoices, personal information about employees and customers, but also video content and much more. Under no circumstances should these be leaked to the outside world. This is because criminals specifically seek out their victims in cyberattacks. They target specific individuals, companies, organizations and authorities in order to harm them, be it through data theft in order to sell them on, or through blackmail in order to enrich themselves. But sabotage to damage competitors or espionage to tap knowledge and information are also common.

This is because criminals specifically seek out their victims in cyberattacks. They target specific individuals, companies, organizations and authorities in order to harm them, whether by stealing data to sell it on or by blackmailing them to enrich themselves. But sabotage to damage competitors or espionage to tap knowledge and information are also common.

Employee training

To ensure that employees become a stable security factor rather than a risk factor, their awareness must be raised. On the one hand, regular employee campaigns and training sessions help to improve knowledge about IT and information security. Training courses in which employees take on the role of a hacker, for example, in order to learn about a wide variety of cyber attack possibilities, help in the long term to identify and ward off threats more quickly. The more educated employees are about threats, the more they behave prudently and can increase security within the company.

Attacks on corporate supply chains have also increased, making IT security prophylaxis necessary there as well. In this regard, employee training also provides support against phishing attacks. Regular updates and anti-ransomware toolkits are equally useful. Crisis and, above all, response plans can make a significant difference if the worst comes to the worst; they could reduce downtime and consequential costs enormously.

Fixing vulnerabilities

On the other hand, further vulnerabilities should be identified. For example, the increasing number of apps and software, or rather their interfaces, represents a problem. These application programming interfaces (APIs) consist of program code that enables the interface to pass on information. Since APIs form a kind of bridge between apps, API security must come into focus. For example, credentials, highly sensitive data, are exchanged here. If the APIs are not sufficiently secured or are defective, they are therefore the particularly sore points in security. This can be remedied by tools such as API scans, which allow them to be analyzed by experts. These scans also provide guidance to programmers on how to fix vulnerabilities. But before they are implemented in a larger environment, they should be extensively tested and properly secured if necessary. Otherwise, the interfaces could become one of the biggest sources of data leaks in the future.

Implementation of software solutions

Last but not least, technical (software) solutions help. They are a proven means of protection, especially the on-premises solution. These are the safest way to protect the company’s data from external access or even data loss. For this reason, VIMP, with solutions specialized for companies, continues to offer completely self-contained operation in the customer’s own data center – i.e. on-premises – in addition to hosting offers. In doing so, control of the data remains with the company itself at all times and is not outsourced externally.

Because one thing is also clear: IT security in a company is a joint project and not just the task of the security team.

Discover more about VIMP’s security measures:

GDPR-compliant video management platform of VIMP

If you would like to learn more about VIMP’s solutions and implementation options, please feel free to contact us via our contact form or by phone at +49 (0) 89 1200 1020.

VIMP Installation Service

Leave the complete installation process of your VIMP platform to us.

 

The VIMP installation service includes:

To access your server from the outside, we need the following:

We recommend Linux as operating system. An installation under UNIX, BSD or Windows is also possible, but is not officially supported by us.

Minimum server requirements for installing VIMP:

Webserver

PHP

MySQL/MariaDB

Transcoding
Please install the transcoding tools exactly as described in the documentation. Installing the standard packages is not sufficient due to patent regulations.

CSS modifications
To concatenate modified CSS files, npm must be installed.

Hardware

As a minimum requirement we recommend:

For productive use we recommend:

We recommend using a RAID controller for additional data security.

VIMP Installationsservice

Überlassen Sie den kompletten Installationsprozess Ihrer VIMP-Plattform uns.

 

Der VIMP Installationsservice beinhaltet:

  • Vorbereitung Ihres Servers
  • Installation der erworbenen VIMP Software
  • Installation der Transcoding Tools

Um von außen auf Ihren Server zugreifen zu können, benötigen wir folgendes:

  • SSH-Zugriff auf Ihren Server (idealerweise als root)
  • Vorinstalliertes Hosting (Apache + MySQL/MariaDB)

Wir empfehlen Linux als Betriebssystem. Eine Installation unter UNIX, BSD oder Windows ist ebenfalls möglich, wird von uns aber nicht offiziell unterstützt.

Minimale Servervoraussetzungen für die Installation von VIMP:

Webserver

  • Apache2
    • Version 2.4 empfohlen
  • oder NGINX

PHP

  • Version 7.1 – 8.0
  • GD-Bibliothek, openssl, cURL, MySQL, mbstring, PDO, pdo_mysql und XSL-Erweiterungen müssen installiert sein
  • PHP CLI (Command Line Interface) muss installiert sein
  • SourceGuardian Extension (außer für ViMP Ultimate Extended)

MySQL/MariaDB

  • MySQL: Version 5.7 – 8.0
  • MariaDB: Mindestens Version 10.2
  • InnoDB muss installiert sein

Transcoding
Die Transcoding-Tools bitte genau wie in der Dokumentation beschrieben installieren. Die Installation der Standardpakete ist aufgrund patentrechtlicher Bestimmungen nicht ausreichend.

  • FFmpeg
  • FFProbe
  • exiftool (>10.8)
  • time

CSS-Anpassungen
Um modifizierte CSS-Dateien zu verketten, muss npm installiert sein.

Hardware

Als Mindestanforderung empfehlen wir:

  • Quad-Core-Prozessor
  • 8 GB RAM
  • 500 GB Festplattenspeicher (die benötigte Größe hängt im Wesentlichen von der Medienzahl ab)

Für den produktiven Einsatz empfehlen wir:

  • Hexa-Core-Prozessor oder besser (mehr Kerne ermöglichen insbesondere eine schnellere Transcodierung der Medien)
  • 32 GB RAM oder mehr
  • 2000 GB Festplattenspeicher oder mehr (die benötigte Größe hängt im Wesentlichen von der Medienzahl ab)

Wir empfehlen die Verwendung eines RAID-Controllers für zusätzliche Datensicherheit.

Kontakt aufnehmen

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Request demo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Contact us

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Demo anfordern

"*" indicates required fields

This field is for validation purposes and should be left unchanged.

Kontakt aufnehmen

"*" indicates required fields

This field is for validation purposes and should be left unchanged.