7 Steps for advanced IT Security

Cyber Attacks are rated among one of the top 5 risks to society. Cyber Attacks also have become a top concern for enterprises and small business around the globe. In an age of more people working from home and an increasing amount of cyber crime more organizations are being targeted than ever before.

An essential IT Security can be expensive but securing your IT infrastructure can save tremendous amount of heartache financially, in terms of productivity and reputation. Just the financial aspect is worth mentioning. IBM Security together with Ponemon Institute released a study on Security Intelligence that the average cost per data breach was roughly $3.92 Million. The study focused on bigger Organisations from 16 countries and 17 industries. But even for smaller corporations, the number of an outage is going to be high. We at Akana feel that this money is better spent at prevention instead of recovering from such events.

7 steps your organization can take to prevent damages

  1. Learn what standard apply and exist to your sector. There are generic Frameworks like NIST and ISO but for Banking, SOX compliance includes Cyber Security.
  2. Move from detection towards prevention. Spend 80% of your IT Security budget on prevention.
  3. Identify your Core Applications and have them secured. Make sure to harden your application.
  4. Do you have Systems that manage Access to Systems and Applications and do your Identities follow lifecycles? And do you review such on a defined schedule?
  5. Do you have group policies in place? For example, regarding password complexity, technical accounts login into your systems interactively, controlling and documenting privileged access to systems.
  6. Do you have a strategy against social engineering?
  7. How often do you review your IT security strategies and processes? Are yearly Audits performed?


1) These are the top risks facing the world in 2020

2) Security Intelligence Report by Larry Ponemon and IBM


The increase in the use of technology in all areas of life has also led to a sharp increase in cyber crime. In Industry 4.0 you work in a network and is always available. The data will become part of the core business. In addition to new market opportunities, this change also entails new security risks. Targeted cyber attacks with the goal of getting money or company secrets are increasing rapidly. Akana supports companies and organizations in all industries in implementing a successful IT security strategy. Our experienced consultants also actively support the implementation of IT security measures so that your company is well protected.


The corona pandemic has digitized our everyday life. In response to the pandemic and to shape their digital future, companies are increasingly using the advantages of cloud infrastructures such as Amazon Web Service, Microsoft Azure, Google Cloud, Alibaba, IBM or Oracle. But what is a “cloud”? What are the advantages for companies? And what do companies have to consider in the area of security and data protection? An analysis.

Element, WhatsApp, Threema, Signal, Telegram, Vibr, Wickr Me and Wire are not rock bands or fashion labels, they are instant messengers that enable the immediate exchange of text, video or voice messages with one or more recipients over the Internet. Thanks to smartphones, these messengers became extremely popular in a private as well as business context, since they allow data sharing in no time. The announcement of WhatsApp at the beginning of this year that the terms of use will be updated, moved data protection and the security of messengers to the fore. But what does this mean for WhatsApp users? How secure are messengers in general? And how are the messages securely stored and transmitted? This article compares four popular messengers – WhatsApp, Threema, Signal, and Telegram – to answer these questions.[1]-[3]


Strategic IT outsourcing requires expertise and experience. Our Senior Consultant Lucas Castro explains a few things you have to consider when deciding to do IT outsourcing and also when searching for the right IT outsourcing partner. Strategic IT outsourcing aims at being a cost saving and efficient solution for the organization long term wether we are talking about SMIs, Fortune500 companies or public administration.


Our Head of Recruitung Dr. Sophie Haberland gives tips on applications for IT consulting positions. She talks about cover letters, interviews and case questions. The aim is to help you make the best of your IT consulting application and help you become an IT consultant at your dream company. Also it should give you a better feeling of the recruiter perspective when applying for a consulting position.

Identity and access management (IAM) is the discipline to enable the right individuals to access the right IT resources, such as systems applications, files, and networks, at the right time for the right reasons. This often needs to be enabled across diverse technologies and the resulting processes must meet the security policies of the organization. The IAM system is a critical part of IT infrastructure of any larger organization.

Our way of working has been turned upside down by the corona virus. Companies had to offer their employees the opportunity to work from home in the shortest possible time. It was not only a challenge to provide the necessary infrastructure. Not infrequently, the necessary safety precautions were also neglected. Thanks to the home office, productivity can be maintained as much as possible. But the new way of working is susceptible to hackers who want to profit from the current situation.

Share with Others
Share on facebook
Share on twitter
Share on linkedin
Share on xing
Share on pinterest
Share on email
Share on print