IT Security Know-how: Terminology & Lots of Interesting Facts
IT - the backbone of your company. All essential processes run through it. But what happens if everything suddenly comes to a standstill?
IT security has become indispensable for companies in times of digital change. ConSol clarifies the basic terms and explains the objectives and areas of IT security. We also point out IT security risks and protective measures.

In today's world, a reliable IT security strategy is essential for companies. Even a little carelessness when receiving emails can have major consequences. At ConSol, our IT security experts will help you develop and implement a customized security concept to keep your company protected.
Christoph Ehlers
Head of Custom IT Solutions
IT Security and What You Should Know about it
IT Security, Cyber Security, Internet Security
IT Security is defined as the protection of IT systems against damage and threats. IT security for companies includes all technical and organizational measures to protect data, end devices, IT systems and cloud services from unauthorized access, theft, espionage and sabotage.
In the context of IT security, a distinction is made between offensive and defensive security.
- Offensive Security: This refers to a proactive and offensive approach to protecting computer systems, networks and individuals from attacks. Offensive security measures include penetration tests, for example, where the technical security of a target system is tested by exposing it to a simulated attack over a defined period of time.
- Defensive Security: This involves reactive security measures such as monitoring and patching applications. Vulnerabilities in the software should be found and rectified. Employee training and the introduction and monitoring of security concepts are part of defensive security concepts.
Cyber Security extends IT security to the entire cyberspace. As most systems today are connected to the internet, IT security and cyber security are equated.
The term Internet Security refers to protection against threats from the Internet.
Information Security
Information Security is generally concerned with the protection of information. This can also exist in non-technical systems, e.g. on paper. IT security, on the other hand, refers to the protection of technical systems.
In Germany, the IT baseline protection of the Federal Office for Information Security (BSI) serves as a guideline for information security.
Data Security
Data Security is concerned with the general protection of analog or digital data, regardless of whether it is personal or not. Data security aims to protect data from threats, manipulation, unauthorized access or knowledge. The focus is on all measures required to ensure the security of data.
IT is the central building block of every company. It forms the basis for all business processes. In the worst-case scenario, disruptions can bring operations to a complete standstill. Economic damage and loss of reputation are the result.
At the same time, increasing digitalization also increases the risk of attacks. The increased complexity and higher degree of networking through mobile devices make systems more susceptible to attacks.
It is essential for companies to secure their IT systems and protect them against attacks. IT security should be an integral part of the corporate culture.
What you need to be aware of: IT security is not a one-off action or a state that is achieved once and persists. IT security is an ongoing process that must be continuously adapted. Business processes, technology, legal framework conditions and attack methods continue to evolve. This results in new requirements and potential threats that need to be actively responded to.
The purpose of IT security is to prevent attackers from spying on, manipulating, copying or destroying data. The three most important protection goals are confidentiality, integrity and availability of information.
Confidentiality of Information
This means that information is only accessible to authorized persons or systems. Access protection must be defined and access rights assigned. Another point in the confidentiality of information is the transportation of data. This should always be encrypted. This prevents unauthorized persons from gaining access to the content.
Integrity of Information
The integrity of information promises that data and content are complete and correct. The systems transmitting data must also function in such a way that information is not altered. This includes preventing the manipulation of data by unauthorized third parties. To this end, security gaps must be identified and rectified.
Availability of Information
This means that the processing of data within the systems runs smoothly. Data must be correctly retrievable at all times. IT systems must be protected against possible failures. The use of load tests helps to check limits so that business operations can be maintained at all times.
Identity & Access Management
Protecting the accounts and access data of a company's employees and customers plays an important role. Identity & Access Management measures include monitoring and enforcing password guidelines. It should be ensured that employees and customers use strong, long passwords and not the same password for multiple accounts. Where possible, additional protection should be introduced using multi-factor authentication (MFA). Biometric methods are used as an alternative or supplement: a fingerprint or facial recognition serves as proof of identity.
Endpoint Security
Endpoint security protects the various end devices in a network against threats. All necessary end devices, i.e. PCs, notebooks, tablets and cell phones, must be secured. This includes the associated operating systems and applications. Basic security is provided by virus scanners and antivirus solutions that detect and ward off malware. To optimize the IT security of end devices, companies should rely on EDR (Endpoint Detection and Response) systems. With the help of machine learning and artificial intelligence, suspicious behavior can be detected even if the virus scanner does not respond.
Email Security
The term email security stands for procedures and techniques that secure email communication against threats. Emails are often used to spread malware, spam or phishing attacks. This makes it all the more important to introduce measures to secure email content. Email encryption is one approach. The content of email messages is encrypted so that information can only be read by the intended recipient.
Web Security
Web security refers to the protection of users, devices and the network against internet-based cyber attacks. Solutions such as firewalls, scanning via intrusion protection systems and URL filtering reduce the security risk posed by unintentional user access to malicious files and websites.
Server Security
Although data centers should be protected from external threats by a robust firewall and other security measures, checking and regularly updating servers for security vulnerabilities plays a crucial role. Therefore, patching and updating servers is an essential part of IT security.
Network Security
Network security pursues two goals: Vulnerabilities in the software and firmware of network devices should be eliminated and the spread of malware should be prevented or made more difficult. In addition to patch and update management for network devices such as routers and gateways, network segmentation plays a central role: different functional areas of the network are isolated from each other. This means that malware cannot easily jump from one area to another.
Cloud Security
The growing spread of cloud computing requires comprehensive security measures. The Cloud Access Security Broker (CASB) plays a key role. As an intermediary between the company network and cloud resources, it guarantees secure communication. IT managers receive an overview of the cloud applications used. This enables shadow IT and compliance violations to be identified and rectified. Cross-cloud identity & access management and encryption are further aspects of cloud security.
Physical IT Security
Physical security is a fundamental component of IT security. It includes measures to prevent dangers from physical impacts on central IT systems such as fire, fire, theft, vandalism or pollutants.
The topic of building security is also increasingly moving into the security focus. Their systems are often connected to IT networks. This increases complexity and the attack surface. The first steps towards secure building technology are access control and logging as well as the creation of a central, automatically updating asset inventory.
IoT Devices
The Internet of Things (IoT) can bring enormous economic benefits. However, IoT deployments present companies with new challenges in terms of security, data protection and compliance. When it comes to security for IoT, another layer comes into play, as this is where the cyber and physical worlds meet. Attacks on IoT infrastructure cause damage that not only results in data loss, but also has a physical impact on facilities.
Advanced security for IoT infrastructures should be based on a three-tier end-to-end approach to protect data, services and connections:
- Secure provisioning of devices
- Secure connectivity between the devices and the cloud
- Protection of data in the cloud during processing and storage
Criminals are constantly developing new methods of attack, are professionally organized and work with the latest technology. IT security is a constant race against these attacks.
But how does a company make itself vulnerable and what are the biggest threats to IT security?
Typical Points of Attack
Users
IT security is not just about computer systems and networks. The “human factor” represents a significant attack surface. On the one hand, carelessness and negligence tempt company employees to carry out risky actions.
On the other hand, cyber criminals exploit the “human vulnerability” to realize their criminal intentions. Social engineering is a tactic designed to trick users into disclosing confidential information. The attackers pretend to be trustworthy or to know the victim.
Lack of patch management
The majority of attacks against IT systems are carried out via vulnerabilities in outdated software products. The manufacturer has fixed this vulnerability in the current software version, but the company has failed to install the updates.
Misconfigurations
Even minor misconfigurations can have devastating consequences for IT security. Threat actors exploit these vulnerabilities to gain unauthorized access to corporate systems. Common attack vectors include:
Privileged Accounts: Cybercriminals often target accounts with elevated administrative rights. Once compromised, these accounts allow attackers to move laterally within the corporate network, take over servers, and modify configurations to their advantage.
Lack of Network Segmentation: Network segmentation involves dividing connected components into separate subnets. By isolating systems—e.g., using IT security gateways—you can ensure that a single security breach does not escalate further, as long as the attacker cannot access additional systems. Without proper segmentation, malware can spread unchecked from one system to another.
Zero-Day-Exploits und Vulnerabilities
A vulnerability is a security flaw in an IT system that poses a threat by allowing attackers to access system resources and manipulate data.
A zero-day exploit refers to an attack that targets a newly discovered vulnerability before a patch is available. The term "zero-day" highlights the fact that software or hardware vendors have only just become aware of the flaw—meaning no security updates exist yet. This creates a critical risk, as cybercriminals can exploit the weakness as an entry point before it is fixed.
IT Security Threats for Businesses
Supply Chain Attacks
In a supply chain attack, cybercriminals don’t target a company directly. Instead, they exploit vulnerabilities in suppliers, third-party service providers, or vendors of software and hardware. The manipulated solutions are then introduced into the target company—often through software updates.
Supply chain attacks can spread via compromised applications, software, firmware, or even hardware, making them particularly difficult to detect and mitigate.
Advanced Persistent Threats (APT)
Advanced Persistent Threats (APTs) are sophisticated, targeted cyberattacks against specific individuals or groups. Malware secretly infiltrates a network and spreads undetected. Attackers use highly advanced techniques to establish long-term access, gather sensitive data, or cause damage.
Phising/Smishing
Phishing is a form of social engineering and the most common cause of successful cyberattacks. Victims are tricked into revealing personal or confidential information through fraudulent emails or messages that appear trustworthy. These emails often contain malicious links or attachments that, once opened, infect the victim’s computer.
Smishing is similar to email phishing attacks. In a smishing attack, cybercriminals send fraudulent SMS messages to trick recipients into clicking on malicious links or revealing their login credentials. Attackers often use personal information to make the message appear legitimate. The goal is to steal credentials and misuse them for further fraudulent activities.
Ransomware Attacks
Ransomware is a malicious form of malware used by cybercriminals to encrypt a company’s computers or systems. Access to the data is only restored upon payment of a ransom. Ransomware spreads through spam emails, phishing attacks, and vulnerabilities in browsers and operating systems.
Distributed Denial-of-Service (DDoS)
DdoS attacks aim to cripple servers, websites, or networks by overwhelming them with massive amounts of traffic. Cybercriminals typically use a botnet to flood the target server with requests, causing it to become overloaded and unable to function properly.
Collateral Damage in Larger Attacks
Many small and medium-sized businesses mistakenly believe they are not targets for cybercriminals due to their size. This assumption is incorrect. Many attacks are not highly targeted but rather executed as large-scale mass attacks. When cybercriminals go after major corporations, smaller businesses often become collateral damage. The impact—whether through deleted or encrypted hard drives—can be just as severe.
IT security is never truly finished—it’s a continuous process. So how can businesses still minimize IT risks and enhance security?
A well-defined security concept, combined with the implementation of technical and organizational protective measures, helps identify and close security gaps within the company.
IT Security Concept, IT Security Policy, and IT Emergency Plan
To protect against cyberattacks, every company must be aware of its IT-related vulnerabilities. An IT security concept addresses a company’s specific security risks, the implementation of controls to prevent threats, and the continuous monitoring of IT systems. To ensure IT security, organizational and technical standards, as well as regulations, are established. This concept should be reviewed regularly and adapted to current conditions.
An IT security policy defines the importance of IT security within the company. It outlines security objectives and concrete strategies to achieve them. The policy covers aspects such as:
- Proper handling of IT systems and equipment
- Setup and management of user accounts
- Access rights management
- Procedures for handling system failures
- Guidelines for emails, internet usage, password policies, and mobile devices
As an additional organizational measure, every company should have an IT emergency plan in place. This plan provides clear instructions for handling various incidents, such as cyberattacks or power outages. The IT emergency plan includes:
- Technical response procedures
- Communication guidelines with responsible personnel
- Contact points for incident reporting and resolution
A comprehensive analysis of company-specific IT risks forms the foundation of a customized IT security concept:
- Identify key assets and classify data based on sensitivity and strategic importance.
- Create a list of potential threats, including malicious and accidental human actions, cybercrime, and natural disasters.
- Identify security gaps and weaknesses within the system.
- Once vulnerable systems are identified, develop tailored solutions to strengthen security measures.
The following questions can help guide the development of an IT security concept:
- How much sensitive data do we store within the company?
- To what extent do our employees access data remotely?
- How many employees require access to specific data?
- What vulnerabilities exist regarding internal and external espionage?
- Which data protection laws are relevant to our company?
When creating an IT security concept, be sure to consider the following points:
1. Classify Your Company Data: Identify and categorize the type and sensitivity of your company’s data.
2. Define IT Security Objectives: Establish key security goals, such as confidentiality, integrity, and availability.
3. Assess the Current IT Security Status: Evaluate your company’s current security posture and existing measures.
4. Identify Security Gaps and Risks: Determine which threats and risks are relevant to your company and assess their potential impact.
5. Implement Security Measures: Define specific actions to improve IT security and minimize the likelihood of security incidents.
6. Assign Responsibilities: Clarify who in the company is responsible for implementing security measures.
7. Communication and Training: Ensure employees are informed about IT security measures and receive proper training.
8. Develop an Implementation Timeline: Set a timeframe for executing security measures and prioritize critical actions.
9. Regular Review and Updates: Continuously assess and update the IT security concept to address new threats and evolving technologies.
The establishment of IT security policies is the responsibility of senior management. This also includes the implementation and operation of an Information Security Management System (ISMS), which ensures the practical application and enforcement of these policies. The ISMS is responsible for identifying and assessing risks, defining security objectives, and documenting processes, responsibilities, and communication channels in a structured manner.
The most well-known standard for certifying an ISMS is DIN EN ISO/IEC 27001:2017. This certification confirms that an organization’s information security management system meets internationally recognized standards. It helps ensure the confidentiality, integrity, and availability of information while strengthening trust with business partners.
IT Security: Technical Protective Measures
What?
Assessing the Status Quo: By evaluating the current state of IT security, all vulnerabilities can be identified. This serves as the foundation for establishing an ongoing information security process.
How?
Bug Bounty Programm: A bug bounty program is an initiative launched by a company that offers financial or material rewards for discovering vulnerabilities in software, applications, or web services. Any identified weaknesses must be reported directly so they can be fixed internally before being exploited.
AV Scanner: Antivirus scanners provide basic security by detecting and blocking malware using constantly updated signature databases.
EDR Solution: Endpoint Detection and Response (EDR) is a cybersecurity solution designed to protect endpoints such as PCs, tablets, laptops, and smartphones. EDR solutions monitor device behavior in real time, analyzing activities for suspicious patterns to detect and mitigate threats.
Penetration Testing (PenTest): A penetration test simulates real-world cyberattacks using the same techniques that hackers would employ to gain unauthorized access to a system. This test helps assess the system’s resilience against attacks.
Zero Trust: The Zero Trust model follows the principle: "Trust is good, control is better." It assumes that no device, service, or request—even from within the corporate network—should be trusted by default. Access is only granted to users who are authenticated, authorized, and connected via an encrypted channel.
Multi-Factor-Authentication (MFA): Multi-factor authentication is a key component of Zero Trust. Users must provide more than one form of verification to gain access. A password alone is not sufficient—an additional factor, such as a one-time code sent to another device, is required.
Updates: Regular software updates are essential for maintaining security. It is crucial to ensure that security patches provided by vendors are installed as quickly as possible to minimize vulnerabilities.
Device Control: Device control prevents unauthorized USB or peripheral devices from accessing sensitive data. It enables the immediate identification of all devices connected to a computer, providing full visibility into incoming and outgoing data transfers.
Next-Gen Firewall: A firewall analyzes data entering or leaving a computer or network, blocking specific network ports and creating a barrier between trusted and untrusted networks. Only traffic that meets predefined security rules is allowed through. Next-generation firewalls offer advanced capabilities beyond traditional firewalls, enabling better detection and prevention of cyberattacks.
IDS/IPS: Next-gen firewalls include Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS). These systems continuously monitor network activity, detect potential security incidents, log relevant information, and take action to prevent breaches. Additionally, they alert security administrators to suspicious activity.
AI Traffic Analyzer: AI-powered traffic analysis enables faster detection of cyberattacks. By leveraging artificial intelligence, metadata from captured network packets can be automatically analyzed, allowing attackers to be identified more quickly and efficiently at every stage of a cyberattack.
Network Segmentation: Network segmentation separates different functional areas within a network, preventing malware from easily spreading from one segment to another. Network Access Control (NAC) identifies all devices within a network and assigns appropriate permissions. Each segment of a network is assigned its own virtual LAN (VLAN), ensuring controlled access. NAC systems automatically place users and their devices into the correct network segment with the appropriate access rights.
CDN: A Content Delivery Network (CDN) distributes online content across globally dispersed servers. Instead of being served directly by the original server, requests are processed by the nearest available server. This helps balance traffic spikes, such as those caused by DDoS attacks, reducing server overload and improving performance.
Proxy: A proxy server acts as an intermediary between two systems, such as a local computer and a website’s web server. By routing traffic through a proxy with its own IP address, overall IT security can be enhanced. When a client makes a request, the response is sent to the proxy first, where its contents are analyzed. Unwanted content is filtered out, and unauthorized remote access is more difficult. Additionally, network administrators can block harmful content, while malware hidden on a website may mistakenly target the proxy instead of the user’s actual device, adding an extra layer of protection at the enterprise level.
IT Security: Organizational Protective Measures
- Establish an awareness of the need for IT security among employees. Create an understanding for the security measures taken and communicate these clearly. Ensure that security-relevant measures are internalized by all employees.
- Define guidelines for the various internal and external communication channels that employees can use as a guide. Define a central internal communication medium such as the intranet.
- Even the most sophisticated security guidelines are of little use if your employees are not trained in dealing with IT, data and information security. The security of your systems can only be guaranteed if technology, processes and people complement each other in the best possible way. Therefore, conduct training courses on data protection and information security for all employees at regular intervals (every 1-2 years).
- Raise awareness among your employees using AI-driven phishing simulations. These help them to recognize telltale signs of an attack and take action. At the same time, knowledge learned is consolidated and checked for effectiveness.
- Create a business continuity plan. This includes a strategy to prevent interruptions to your operations or at least to ensure a quick recovery. Clearly define roles and responsibilities for all teams. The use of technologies and tools for backup and recovery, including remote working platforms, must be clearly outlined.
- Take out cyber insurance for your company. This additional insurance offers you protection in the event of incidents such as hacker and ransomware attacks, fraud and other cybercrime activities. It protects against financial losses and liability claims that may arise from cyber attacks and data breaches.












More than
200 customers
trust ConSol
for their
IT & Software
Individual Software & Customized IT Solutions: Portfolio
Still have Questions about IT Security & ConSol?

Let's talk!
Samuel Pabst