Skip to content

Cybersecurity

In our increasingly connected world, machines and computers are vulnerable to various security risks in the field of cybersecurity. These risks can lead to serious consequences, ranging from data loss and operational disruptions to financial losses and even physical damage. Below are some of the most common security risks and potential entry points for cyber attacks on machines and computers:

Harmful Software and Malware

One of the biggest threats is malicious software such as viruses, worms, trojans, and ransomware. These can infiltrate a system and enable unauthorized access, encrypt data, or even paralyze the entire system.

Vulnerabilities in Software and Operating Systems

Every software and operating system has potential vulnerabilities that can be exploited by attackers. These vulnerabilities can arise from faulty programming, outdated software versions, or inadequate configuration.

Phishing and Social Engineering

Attackers often use deception techniques such as phishing emails, fake websites, or fraudulent calls to obtain confidential information. By exploiting human weaknesses and creating false trust, attackers can gain access to systems or data.

Insufficient Access Controls

Weak passwords, inadequate permission management, or unprotected remote access can provide entry points for unauthorized persons. If access controls are not properly implemented, attackers can easily gain access to sensitive information or systems.

Physical Access

Physical access to machines or computers can pose a significant security risk. If an attacker has physical access to a device, they can install malicious software, manipulate hardware, or steal sensitive data. Missing Security Updates: When security updates and patches are not regularly installed, systems remain vulnerable to known weaknesses. Attackers can exploit these vulnerabilities to infiltrate a system and gain control.

Recommendation

Keep your operating system and software up to date: Regular updates and patches are important as they close security gaps and minimize potential entry points for attackers.

  • Use strong, unique passwords - Avoid simple passwords and use a combination of upper and lower case letters, numbers, and special characters. Use a unique password for each service to prevent all others from being compromised if one account is compromised.
  • Enable Two-Factor Authentication (2FA) - 2FA provides an additional layer of security as it requires a second confirmation method besides the password, such as a one-time code sent to your mobile phone. This makes it more difficult for attackers to access your accounts. Be careful with emails and attachments: Don't open email attachments or links from unknown senders as they may contain harmful code. Be particularly suspicious of phishing emails aimed at stealing your personal data.
  • Use reliable antivirus and firewall software - Install current antivirus software and a firewall on your computer to detect and block malicious software.
  • Regularly back up your data - Create regular backups of your important files and store them in a secure location. This allows you to recover your data in case of a ransomware attack without paying the ransom.
  • Raise awareness among yourself and your employees - Train yourself and other users about the risks of cyber attacks, phishing, and social engineering. Awareness and regular training help reduce the attack surface and promote security-conscious behavior.
  • Minimize physical access - Mechanically prevent the connection of external devices such as USB sticks/hard drives or mobile phones to machines/computers if they are not required for operation

INFO

Please note that the following list is not exhaustive and Jentschmann AG only provides recommendations to improve the security of machines and computers. It is important to consider additional security aspects and individual requirements.

Virus Scanner

On computers provided by Jentschmann AG, the installation of software for detecting unwanted programs (so-called virus scanners) is generally possible and recommended. All Jentschmann AG computers are delivered with Windows Defender. In case the customer installs their own software that replaces Windows Defender, it must be maintained by the customer themselves. If the machine is equipped with a real-time PLC (Beckhoff TwinCat), compatibility must be ensured before installation. Settings may need to be adjusted to avoid interfering with real-time operation.

Network Integration

We use either Windows 10 LTSC or Windows 11 Professional as operating systems. The operating system remains largely untouched and is delivered with default settings. The system language is always English but can be changed upon request. Fixed IP addresses, DNS settings, and similar configurations can be set in the machine/computer. Additionally, there is the possibility to integrate the machine/computer into a domain. Both fall within the customer's responsibility. As Jentschmann AG, we are happy to provide support to our customers. However, if we are commissioned to perform these configurations, we reserve the right to charge for this service. With the integration of a computer into the customer-provided domain, support for this computer must be provided by the customer. Jentschmann AG can only provide supporting help with any computer problems. In case additional effort is required due to customer-side IT updates or support, Jentschmann AG reserves the right to charge for this effort.