IT security at MC Technologies
MC Technologies is the digitalization expert for industrial data communication. With our core competencies of remote maintenance, network technology and data transmission, we form the bridge between IT and OT. Our solutions are therefore often the central gateway for communication from closed and secure networks to the outside world and the open Internet. The potential for damage is enormous, especially for operators of critical infrastructures such as energy suppliers, municipal utilities and energy producers. This makes them an attractive target for attackers, which is why the security of our solutions is a top priority.
We are characterized by our ability to consider and implement even complex and high security requirements of our customers.
IT security features of our industrial routers
- Integrated firewall
- Protection of unauthorized software downloads through Secure Boot
- Access and user management
- Password protection with defined rules
- Cryptographic password encryption in accordance with BSI TR-2102
- Patch and update management
- Protected OS on delivery through pre-configuration
- Penetration tests
- Certified development process according to IEC 62443-4-1

YOU are also a lucrative target!
Attacking systems at all can have various motives, even if these are not obvious at first glance.

- Blackmail:
Disruption of production processes that is only reversed against payment of money, e.g. with the use of ransomware - Industrial espionage:
Theft of business-critical information and know-how - Political motivation:
Attacks on critical infrastructure as part of a “cyber war” - Demonstration of power:
Causing maximum damage without a specific target - Demonstration of feasibility:
Attacks to improve the resilience of the systems