Um die einzelnen YouTube-Videos zu sehen, müssen Sie hier die Datenschutz-Einstellungen freigeben.
About the Cyber Security Cluster Bonn
Cyber Security Cluster Bonn e.V. - this name stands for a cyber security network with a focus on the Bonn/Rhine-Sieg region. The aim is to make a joint contribution to immunizing society against cyber attacks and to make Bonn tangible as the "heart of operational cyber security in Europe". To this end, almost 90 member institutions from industry, research and the public sector have now joined forces. In addition to Deutsche Telekom, the Fraunhofer Gesellschaft and the City of Bonn, the Bonn-Rhein-Sieg University of Applied Sciences, the Bonn/Rhein-Sieg Chamber of Industry and Commerce and medium-sized companies are also represented on the board. The advisory board is made up of the BSI, the Bonn police and the cyber unit of the German Armed Forces, the Cyber and Information Space Command.
In addition to the flagship event, the Cyber Security Tech Summit Europe, the association organizes events such as the Bonn Dialogue for Cyber Security (BDCS) or "IT Security Breakfasts" to raise awareness of the topic and provide information on current challenges. Due to the coronavirus situation, the last events were held online. A short guide "Cyber-Safe through the crisis" was also developed, which explains the key aspects of a secure home office workplace.
Internally, the cluster members work together in expert groups, e.g. on the question of how IT security training and further education programs should be designed. Cluster members also form consortia to initiate joint projects and submit funding applications. The focus is often on the transfer of know-how into practice. The Wise Council of Cyber Security Experts was founded to advise politics, business and society on IT security issues. This "Wise Council" will shortly be publishing its first report with recommendations for policymakers.
The current situation
1. general basics: what you can implement immediately
Many companies and employees are currently facing new challenges, particularly due to the rapid switch to working from home. Here we show you what you can and should implement immediately at your workplace.
- Activate password protection for your PC or laptop.
- Lock the screen when you are absent.
- Switch off voice-controlled devices (e.g. Alexa or Siri) while you are working.
- Use a webcam cover when the webcam is not in use. Ideally, do not point your screen towards a window, especially if you live on the first floor. In any case, aligning the monitor at right angles to the window prevents reflections, which are straining for the eyes.
- Keep your software up to date. If necessary, update youroperating system, the programs you use and also check whether there is an update for your router, for example.
- Activate the virus scanner (e.g. the Defender integrated in Windows) and keep antivirus signatures up to date.
- Check whether the firewall integrated in your operating system is activated. Windows: Control Panel - System - Security - Windows Defender Firewall. Mac: System Preferences - Security - Click on the "Firewall" tab (at the top) - activate the firewall if necessary
- Encrypt portable IT systems and data carriers (e.g. with VeraCrypt, DisKCryptor or FileVault). Discuss the options with your company's IT contact.
- Use a different, secure password for each account. If necessary, use a password manager - e.g. Keychain (Mac), KeePass or ButterCup.
- Protect your router and WLAN against unauthorized access. The German Federal Office for Information Security(BSI) offers corresponding instructions (opens in a new tab).
- Activate two-factor authentication (2FA) wherever possible: With 2FA, you as a user prove your identity using a combination of two independent components (factors). A well-known example is the use of login data + transaction number (TAN) for online banking. With your Microsoft account, for example, you activate 2FA as follows:
- Log in to your Microsoft account at https://office.com, click on your initials at the top right and select "My account"
- Click on "Security and privacy" on the left and select "More security options"
- Under "Two-step verification", select the option "Set up two-step verification" and follow the instructions - Use VPN software to connect securely to your company network. Contact your IT manager to set this up. You can think of a VPN connection as a secure tunnel between your computer and your company network. The BSI also provides instructions on how to set this up (opens in a new tab).
- Only use unencrypted, public WLAN connections, e.g. in the park or on the train, for business purposes in combination with an activated VPN. If in doubt, connect via the mobile network or your smartphone as a hotspot (LTE).
- Ideally, alwayssave data on your institution's central systems and not locally. If you still want or need to save data locally, create regular backups of this data.
- Store unused devices securely and protect them from access.
- Adhere to the security guidelines of your institution. If in doubt, ask those responsible for IT and check your settings using the Alliance for Cyber Security checklist (opens in a new tab), for example.
2. phishing/spam mails/CEO fraud: criminals also see the crisis as an opportunity
Criminals also see the crisis as an opportunity and are looking for new ways to gain access to sensitive data. We explain what you can do to protect yourself and your data.
The physical separation of teams and colleagues increases the likelihood of (spear) phishing being successful.
This is why it is particularly important now:
- Do not open any attachments or links in emails from unknown senders.
- Also look out for discrepancies in emails from supposedly trustworthy senders.
- If you are unsure, get in touch with your contact person.
- Pay particular attention to websites with coronavirus content. There are currently a number of fake coronavirus websites whose purpose is to steal data or infect your system.
Other social engineering attacks such as the "CEO fraud" attempt - the fraudster pretends to be your superior and asks you to disclose sensitive information - are also currently on the rise. Therefore, never disclose sensitive data without further ado. Verify potentially critical requests, e.g. by calling back.
3. healthy in the home office: self-organization at the home workplace
Working from home should not lead to a lack of exercise and social contact. Read here to find out how to prevent this and how to organize yourself at your home office.
- Set up a workstation and keep it as tidy as possible. If possible, use aseparate study at home to keep work and private life separate.
- Structure your home office day and find your personal working rhythm. If possible, adjust your working hours to the rhythm in which you can work most productively.
- Carry out your morning routine: Give your mind a chance to switch into work mode by getting ready for work as usual.
- Even in the office, you don't work for eight hours straight. Even when working from home, talk to colleagues, take coffee breaks "together", air the room regularly and don't take your lunch break at work.
- Minimize distractions at home. It is best to mute your personal smartphone. Perhaps your home office even allows you to be particularly focused at work.
- Separate work time and private time: set yourself limits and consciously end your working day at the appropriate time.
- Eat a healthy diet and get some exercise during your home office day. For example, use the time you would otherwise spend commuting to work.
- Communicate with colleagues and managers and don't be afraid to talk about the personal challenges of working from home. Only use services for communication that your company has authorized.
4. learning safely with digital media
How to use it successfully at home
Due to school closures, children have to study the content of their lessons at home. In addition, digital services such as knowledge apps, educational videos and online games are increasingly being used. We give you tips on how to implement digital learning safely at home.
- Educating children about risks on the internet is the be-all and end-all. In addition, technical measures can also help to make the experience in the digital world as safe as possible.
- Check whether all the essential basics mentioned in chapter 1 have been implemented on the device used by your children.
- Set up your child's own user account with limited permissions and configure it so that your child only has access to applications that you have approved.
- You could also set up child-friendly search engines (e.g. Blinde Kuh (opens in a new tab)) and activate content filters (opens in a new tab)if necessary.
- If a smartphone or tablet is used for learning, only install apps from trustworthy sources (App Store/Google Play).
- Further extensive information and many helpful websites on the subject (e.g. Klicksafe (opens in a new tab) or Internet-ABC (opens in a new tab)) can be found at the Medienanstalt NRW (opens in a new tab).
If your children use knowledge apps, learning platforms or online games, use the following criteria to check the quality of the offer:
- Which institution is behind the offering?
- Is the content based on sound scientific findings?
- Is the content prepared in a child-friendly way?
- Is the content free of advertising, in-app purchases and subscriptions via SMS activation?
- Do you have to provide personal data - and if so, what is it used for?
- If it is directly related to the content covered in school: Is the content based on the curricula of the federal states?
If in doubt, consult the contact persons at your child's school.
Cyber security: For IT managers
5. clear communication channels
Specific contacts for employees
When the majority of colleagues move to the home office, the IT department can usually no longer be reached "across the corridor". Clear communication channels and contact persons should therefore be defined immediately - especially for IT incidents.
- Inform your employees who to contact in the event of IT support and emergencies and how they can be reached.
- Our tip: Customize the templatePPTX-File1,11 MB to create an overview of contact persons for your employees.
- If your IT is operated by external service providers, check their current availability.
- If personal data is stolen, this is a reportable incident. Report such incidents immediately. You can find information on this on the BSI website (opens in a new tab).
6. video conferencing systems
Comparison of frequently used tools
Video conferencing systems are often the best way to stay in touch with your team and colleagues. In the following, we compare some of the most frequently used systems and explain their advantages and disadvantages with a focus on aspects of data protection and security.
WebEx, Microsoft Teams, Zoom, GoToMeeting and Jitsi are frequently used video and web conferencing tools. They differ in terms of functionality, price and also in terms of IT security and data protection.
To select a suitable tool, we recommend carrying out a risk analysis tailored to your specific application scenario.
Use the following aspects to help you make your decision:
- Access restrictions: Meetings should be able to be effectively protected (by login, passwords, etc.) against unauthorized participation. This is provided by all the tools listed on the following page.
- Blurr option: To preserve privacy and protect sensitive information, it can be useful to make the background unrecognizable.
- Regulation of recording options: If tools offer the possibility of recording, all participants in the video conference must be clearly informed of the recording. Ideally, consent is automatically requested from the participants.
- Location of the provider and GDPR compliance: It is recommended to use solutions from providers that operate servers in Germany or within the EU.
- Encryption: The encryption of data transmission takes place at various levels in video telephony.
Tool | Advantages | Disadvantages |
---|---|---|
WebEx (Cisco, USA) | Many functions; no account or installation required for participants; GDPR easy to implement | Blurr option only in iOS app and DeskPro version |
Microsoft Teams (Microsoft, USA) | Universal solution for collaboration incl. video conferencing; many functions; GDPR easy to implement | Registration only with personal account; time-consuming setup without Office 265 subscription; telephone dial-in only via paid add-on |
Zoom (Zoom Video Communications, USA) | Many functions; easy to use; no account or installation required for conference participants | Data protection/security issues (although Zoom is currently responding quickly) |
GoToMeeting (LogMeln, USA) | many functions; easy to use; no account or installation required for conference participants; GDPR can be easily implemented | No Blurr function |
Jitsi Meet (open source) | Many functions; easy to use; no account or installation required, even for meeting initiators; free of charge | server may be overloaded with a large number of participants (pay attention to configuration); meeting recording only via Dropbox and often overloaded |
7 Other: Further recommendations
- Check and restrict access options and access rights to your institution's systems and information to a necessary minimum.
- Establish general rules for the use of non-institutional IT systems.
- Provide clear instructions for employees, e.g. through brief instructions, checklists or video training. The BSI's Alliance for Cyber Security, for example, offers a checklist for employees (opens in a new tab). A checklist for IT managers (opens in a new tab) is also available here.