The PetrolPlaza audio version is presented to you by UNITI expo 2022, the leading retail petroleum and car wash trade fair in Europe.

Hack us if you can – data security in the cloud

Last update: | Advertorial
Hack us if you can – data security in the cloud
© Faschang Service & Management GmbH

We launched our maintenance software package – omis 4.0 – entirely as a cloud application as long ago as 2005. At the time, many people were still very sceptical about this technology, particularly regarding the issue of data security – quite wrongly in our opinion. The security of data in the cloud, in the computing centres of certified hosting partners, is generally much higher than a company could achieve with its own in-house IT infrastructures. However, the greatest risk arises from users themselves. Passwords that are either too simple or jotted down somewhere easy to see, unencrypted USB flash drives and hard disks of mobile devices, unsecured server rooms, etc. contribute largely to this.

Undeniably, there is naturally always a risk that systems will be subjected to "external" attack. In all the years, we have not registered a single case of data misuse so far. Not least because we have continuously optimised our systems to meet the latest challenges.

This should not lull us into a false sense of security, however, which is why we decided this year to subject our software systems to an intensive penetration test in order to uncover any critical security issues. A heads up on the result: All attacks were successfully repelled and we have been certified with a very high security standard!

We also had our omis 4.0 software solution and our server infrastructure investigated for their general protection against unauthorised access and their data security. In addition to software architecture and transmission security, the server environments were also put to the acid test. The recognised experts from Limes Security conducted countless tests and attacks over an extended period in order to highlight any security risks. The experienced testers found it impossible to successfully compromise a system without valid access data – i.e. they had no opportunity to break into our systems and access any data. Although we privately expected this to happen, we are very proud that our systems – and above all those of our customers – could not be cracked. Nevertheless, we will not rest on our laurels. We will constantly strive to maintain this high security standard and keep adapting our systems to meet the latest requirements.

This result confirms once again that the clear advantages of cloud solutions, for example as regards mobility, maintenance and support, update scenarios and scalability (flexibility), need not be associated with lower data security – quite the contrary!

If you are interested in further details, let's get in touch.

Related contents