Security situation in cyberspace
These include special intrusion prevention signatures, operating system and gateway configuration settings, automatic management responses, and commands for dynamically blocking attack sources. If you want to defend against DDoS attacks in their entirety, a so-called perimeter attack mitigation device is recommended. This is capable of protecting companies against new network and application threats. In addition, a number of measures should always be on the checklist: protecting infrastructure from network and application outages, identifying and closing application vulnerabilities, preventing malware spread and network anomalies, and safeguarding against information theft.
Lothar Geuenich, Regional Director Central Europe at Check Point Software Technologies: "The geopolitical situation undoubtedly shows that wars are no longer fought only in the analog world, but increasingly in the digital world. In the process, even companies and organizations that at first glance appear to be neither geographically nor politically directly involved are being targeted by cyber attacks. Those responsible in IT security departments must be prepared for a range of attack types while, and this is essential, always remaining in close contact with law enforcement agencies, intelligence services and Computer Emergency Response Teams, also known as Incident Response Teams. The motto is always prevention, not reaction. Reacting means an attack has already succeeded and now damage control is being done."