More

    Cyber security key issue for research and commerce

    Cyber criminals are constantly using phishing emails, dangerous downloads and other startling means to access computer systems without authorisation. “However, clearly identified systems can be made hacker-proof,” said Volker Skwarek, Professor of Computer Engineering and Head of the Cybersec Research and Transfer Centre (FTZ) at the Hamburg University of Applied Sciences (HAW Hamburg). Sounds simple, but nothing could be further from the truth! Although digital identities ensure that only authorised users can access certain systems, this protective measure is undermined in everyday life. An employee, for instance, can request a new printer that connects without being appropriately authenticated. Network devices with their own software, storage functions, and remote access options are ideal gateways for hackers. And handling peripheral devices carelessly can swiftly become vulnerable and perhaps prove the weakest link in a company’s security concept. Commenting on carelessness, Skwarek warned: “If you want to be on the safe side, never scan a QR code. You never know where the code leads to.”

     

    Latest articles

    Related articles