Skip to main content
search

Practical Approaches to IT Security

22. August 2025 Technology
Graphic featuring Speedy with IT security symbols for the ADITUS blog post on practical IT security

Companies face the ongoing challenge of protecting their systems against external attacks and internal risks. With increasing threats and rising regulatory demands, relying solely on isolated checks or individual security measures is no longer sufficient. A holistic security approach is essential. Let’s take a closer look at the key components of IT security.

Independent Security Testing to Identify Weak Spots

One of the central tools in IT security is conducting regular security audits. These systematic assessments uncover vulnerabilities and test the resilience of applications and infrastructure against potential attacks. Of particular importance are penetration tests, which can be carried out under different scenarios:

  • Black-box tests simulate external attacks without prior knowledge. Testers receive no internal information beforehand, recreating potential threats as realistically as possible.

  • White-box tests involve full system knowledge. Code, architecture, and configurations are analysed to identify hidden weaknesses.

Combining both methods ensures a comprehensive view of possible vulnerabilities. For companies, this provides a complete security picture and the opportunity to address critical issues proactively.

Independent Testing at ADITUS

Our Visitor Portal v5 and Identity Provider underwent an extensive assessment by the independent provider Turingpoint, including both black-box and white-box testing. The result: a flawless risk summary – demonstrating the care and precision we invest in securing our systems.

 

Continuous Security with SIEM Technology

While audits provide valuable point-in-time insights, continuous monitoring is crucial for maintaining security. This is where Security Information and Event Management (SIEM) comes into play. A SIEM system continuously collects data from multiple sources – such as log files, user activities, and network access – and correlates the information. Instead of viewing isolated events, the SIEM provides a complete picture of system activity. Whenever suspicious patterns are detected, the system immediately raises an alert.

Key benefits include:

  • Early detection of irregularities in real time.
  • Support in meeting compliance requirements, including ISO 27001 and GDPR.
  • Centralised access to all relevant data for precise incident analysis.

SIEM at ADITUS

We actively use SIEM to detect suspicious patterns at an early stage, allowing us to mitigate potential threats before they become critical.

 

Reducing Risk Through Employee Awareness

Technische Systeme sind wichtig, doch die größte Schwachstelle in der IT-Sicherheit bleibt der Mensch. Angreifer:innen nutzen Täuschung, um Zugangsdaten oder sensible Informationen zu erlangen. Um dem vorzubeugen, sind Aufmerksamkeit und Bewusstsein entscheidend, sodass Mitarbeiter:innen verdächtige E-Mails zuverlässig erkennen und angemessen darauf reagieren.

While technical solutions are essential, the greatest vulnerability in IT security remains the human factor. Attackers increasingly rely on deception to obtain login credentials or sensitive information. Raising awareness and vigilance is key, helping employees to identify suspicious emails and respond appropriately.

How Security Training Strengthens Our Security Strategy

Our security strategy includes regular training sessions designed to raise awareness of phishing attempts and equip employees to recognise them.

 

Timely Updates Through Automated Patch Management

Another critical element of IT security is patch management. Unpatched systems are among the most common entry points for successful attacks. Hackers often exploit known vulnerabilities in operating systems or applications that could have been resolved with timely updates. Best practices recommend clearly defined timelines and streamlined processes to ensure security updates are applied quickly. Automation plays a key role in preventing delays.

Streamlined Security Patching at ADITUS

We deploy all security-related updates automatically and without delay:
• End-user devices: Operating system updates are installed within 48 hours.
• Servers: New updates are rolled out within seven days.
• Emergency patches: Prioritised and deployed immediately after internal assessment.

 

Hosting with Confidence: High-Security Data Centres

In addition to software and processes, physical infrastructure is a critical part of IT security. Modern data centres must not only deliver powerful systems but also adhere to the highest security standards. These include multi-level access controls, fire protection, redundant power supply, and intelligent climate management. Such measures ensure availability and security even under exceptional conditions.

Where Our Systems Live – And Stay Secure

Our systems are hosted at the high-security data centre of noris network AG in Nuremberg – one of the most advanced facilities in Europe. Transponder cards, biometric authentication, video surveillance, inert gas fire suppression, and redundant power and climate control systems guarantee maximum protection.

 

Controlled Access with Privileged Access Workstations (PAWs)

Administrative access represents one of the most sensitive areas within any IT infrastructure. To ensure the highest level of security, we rely on Privileged Access Workstations (PAWs) – dedicated, isolated environments used exclusively for administrative activities. This approach ensures strict control and traceability when accessing critical systems.

How We Use PAWs to Protect Sensitive Areas

At ADITUS, all sensitive administrative tasks are performed using PAWs, guaranteeing compliance with the highest security standards.

 

Cybersecurity as an Ongoing Commitment

IT security is an ongoing process. As systems, threats, and regulatory requirements evolve, security strategies must adapt accordingly. That’s why we conduct automated, weekly security tests across our solutions, continuously analysing and evaluating the results.
For maximum transparency, we publish the results in our Release Notes every three weeks in the ADITUS Customer Area. By doing so, we demonstrate that security is not just a requirement but an integral part of our quality promise – giving our customers the confidence that their data and systems are in safe hands.

zurück zum Blogback to the blog