Measures for cyber security

There are a variety of measures that you can implement to increase the cyber security of your system. The measures listed below should form the basis for further measures.

Basic measures

Employee training

Train and sensitive all employees in IT security matters to minimize human error.

Access controls

Restrict access to buildings, facilities and their IT infrastructure to prevent physical access by unauthorized persons.

Program update

Keep all programs up to date to close security gaps.

Password management

Use secure passwords and manage them correctly to prevent cyber attacks.

Data backup

Back up your data regularly to protect yourself from ransomware and other cyber threats.

Examples of detailed measures

Physical security

  • Access controls to the buildings and server rooms
  • Protection against unauthorized opening of housing
  • Contactor protection against environmental influences (dust, moisture, heat)

Network security

  • Use of firewalls and intrusion detection systems
  • Segmentation of the network and isolation of critical systems
  • Secure configuration of network components

System hardening

  • Deactivation of unnecessary services and interfaces
  • Use of antivirus and anti-malware software
  • Regular updating of operating systems and applications

Access control

  • Strong authentication procedures
  • Minimal assignment of rights (principle of least privilege)
  • Logging and monitoring of access

Data and communication security

  • Encryption of sensitive data both at rest and in transit
  • Secure configuration of wireless networks
  • Contactor protection against data leaks and loss

Patch management

  • Regular checks for security updates
  • Planned and traceable update processes
  • Management of software licenses and compliance

Backup and restore

  • Regular backups of important systems and data
  • Tested emergency recovery plans (disaster recovery)
  • "Offsite" storage of backup copies

Incident response

  • Prepared response plans for security incidents
  • Staff training in dealing with security incidents
  • Communication plans for internal and external stakeholders

Awareness and training

  • Regular security training for employees
  • Awareness campaigns for phishing and social engineering
  • Clear security policies and procedures

Compliance and audits

  • Review and compliance with relevant industry standards and laws
  • Regular internal and external security audits
  • Documentation and reporting for proof of compliance

 

 


• Published/reviewed: 2025-06-27 • Revision 018 •