INSIGHTS
Step 0: IT security
There is no such thing as an invulnerable IT system, but many companies are unaware of the dangers they face in cyberspace. Worse still, many companies are simply unaware of these risks - until the first serious incident occurs, while most of them could be avoided and prevented with conscious and systematic cyber defence preparation.Preventive approach and resilience are the two most important pillars of cybersecurity incident response. At Magyar Telekom, organisations can obtain the latter in the form of security as a service, whether they are a small family business or a global multinational.
Statistics show that the average hacker, once they have gained access, spends around 200 days in an organisation's systems, in the vast majority of cases, without anyone noticing. It's no coincidence that experts agree that cyber defence starts with prevention.

In contrast, many businesses in our country still believe in invulnerable IT systems. Either they are unaware of the risks they face in cyberspace or they simply ignore them. In reality, almost every company's IT systems have experienced some form of security incident - it is a question of how aware they are or whether they have not even noticed.
This is particularly the case in segments where cybersecurity is not as widespread and popular. Either because there is not enough money or because there is not a real need. Passive ignorance typically lasts until the first serious incident, with at least two drawbacks: firstly, the damage caused is in itself a major cost and energy to repair, and often the extent of the damage is not immediately clear: it is only discovered much later.
The CTRL (Cyber Threat Resilience) team provides this resilience to its customers by enabling IT systems and their operators to detect and respond to cyber security events and incidents in a controlled, 24/7 environment.
Methodological approach is also important because hackers know that penetrating directly into the systems of a large company is a much greater challenge than finding a supplier that is a weak link in the cybersecurity. This is why Magyar Telekom has a cross-segment portfolio at its customers' disposal, to ensure that cybercriminals have as little room for manoeuvre as possible.