Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Budget in IT security!
Consulting

Budget in IT security!

The price of IT security in an enterprise continues to rise. For this, a suitable budget must be deposited.

Chris Wojzechowski Chris Wojzechowski Geschäftsführender Gesellschafter
Updated: September 30, 2024 3 Min. read
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Table of Contents (3 sections)

Every company has a budget that is dedicated to IT. Consequently, some of that should go toward maintaining the company’s cybersecurity. This can take on very different dimensions.

A budget for IT security!

Within a company you have different budgets for certain areas. For example, every company has a budget earmarked for IT security. Mostly, this amount comes from the expenses that were budgeted for the general IT of the company. A survey by the German Federal Office for Information Security(BSI) says that more than half of companies spend less than 10% of the budget earmarked for IT on cyber security. However, the BSI recommends investing up to 20% of the IT expenditure in the security of the company, otherwise it is usually not enough. Such a budget can be invested in various things. On the one hand, there is the option of having a penetration test carried out and thus identifying vulnerabilities. Another option is to raise employee awareness, for example in the form of live hacking. Since humans are usually the greatest weak point in systems, such awareness measures are a prerequisite for a secure system environment for companies.

What incidents?

Recently, there has been an increase in attacks on businesses and merchants. For example, the electronics stores Media Markt and Saturn were affected by an attack. The hackers were targeting customer service and, for example, it was not possible to collect goods ordered online for almost two weeks. Ransomware is usually used in such attacks, encrypting systems and only releasing them after a sum of money has been paid. Another alarming example is the attack on the Eberspächer company. An attack occurred there, forcing the company to shut down all of its systems to avoid major damage. In the end, all IT systems had to remain offline for over a month. During this period, the automotive supplier with its more than 50 plants worldwide was therefore unable to generate normal sales. Presumably, this “offline month” was more expensive for the company than the budget they would have spent on IT security.

Reaction of the Schwarz Group

The Schwarz Group is a conglomerate consisting of the supermarkets Lidl and Kaufland. Now this company has decided to be better protected against cyber attacks in the future. Therefore, no less than 700 million US dollars have been set aside as a budget for more IT security. The special thing about this is that the Schwarz Group has commissioned the Israeli security service XM Cyber to do this. XM Cyber was founded by former Mossad agents Tamir Pardo, Noam Erez and Boas Gorodisski and mainly simulates attacks on the company to be protected in order to uncover vulnerable points. Mossad is an Israeli foreign intelligence service, comparable in structure to the CIA or the German Bundesnachrichtendienst. With these examples one can see well that a sufficient budget for the IT security of an enterprise is worthwhile itself, since thus possible attacks can be prevented or weakened and thus the enterprise cannot come to a standstill.

Next Step

Our certified security experts will advise you on the topics covered in this article — free and without obligation.

Free · 30 minutes · No obligation

Share this article

About the author

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen — CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking — Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
Certified ISO 27001ISO 9001AZAVBSI

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung