{"id":4557,"date":"2021-09-23T12:15:49","date_gmt":"2021-09-23T10:15:49","guid":{"rendered":"https:\/\/www.digitronic.net\/?page_id=4557"},"modified":"2026-03-05T13:54:52","modified_gmt":"2026-03-05T12:54:52","slug":"finance","status":"publish","type":"page","link":"https:\/\/www.digitronic.net\/en\/finance\/","title":{"rendered":"Finance"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column el_class=&#8221;bild&#8221;][vc_single_image image=&#8221;4523&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_section][vc_row][vc_column width=&#8221;4\/5&#8243;][vc_column_text el_id=&#8221;contact&#8221; el_class=&#8221;anker&#8221;]Anker[\/vc_column_text][vc_column_text]<\/p>\n<h1>IT security for banks<\/h1>\n<p>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1632390657445{margin-bottom: 20px !important;}&#8221;]Cybercrime has long been a real threat to the financial sector. In order to counter this threat by improving the IT security of banks in particular, the legislator is holding the financial sector, which is particularly at risk, accountable. The industry-specific requirements of the CRITIS sector and the Minimum Requirements for Risk Management (MaRisk) determine this legal framework.<\/p>\n<p>In the following, you will learn from practical use cases how our <a href=\"https:\/\/www.digitronic.net\/en\/encryption\/\" target=\"_blank\" rel=\"noopener\">HiCrypt\u2122<\/a> encryption solution and <a href=\"https:\/\/www.digitronic.net\/en\/2-factor-authentication\/\" target=\"_blank\" rel=\"noopener\">SmartLogon\u2122<\/a> smart 2-factor authentication solution can support you in improving IT security at your company.<\/p>\n<p>The solutions can be purchased individually or in attractive packages and are ready for use within a very short time &#8211; without any time-consuming conversion of your IT infrastructure.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/5&#8243; el_class=&#8221;ansprechpartner&#8221; css=&#8221;.vc_custom_1637750041037{margin-bottom: 50px !important;}&#8221;][vc_column_text el_class=&#8221;gruen_weiss&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>I\u2019m here for you!<\/strong><\/p>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]<img decoding=\"async\" class=\"wp-image-9745 size-full aligncenter\" src=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-scaled.jpg\" alt=\"\" width=\"2560\" height=\"2560\" srcset=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-scaled.jpg 2560w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-300x300.jpg 300w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-1024x1024.jpg 1024w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-150x150.jpg 150w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-768x768.jpg 768w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-1536x1536.jpg 1536w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-2048x2048.jpg 2048w, https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-1200x1200.jpg 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/>[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1767799141118{background-color: #f7f7f7 !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>Alexander Woeschka<\/strong><br \/>\nManaging Director<a class=\"later\" href=\"mailto:bp@digitronic.net\"><br \/>\n<\/a><a class=\"later\" href=\"tel:+4937181539444\">+49 371 815 39-444<\/a><a class=\"later\" href=\"mailto:bp@digitronic.net\"><br \/>\n<\/a><a class=\"later\" href=\"mailto:sales@digitronic.net\">sales@digitronic.net<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][\/vc_section][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1587460246234{padding-bottom: 20px !important;background-color: #97be0d !important;}&#8221; el_class=&#8221;gruen_weiss&#8221;][vc_column width=&#8221;1\/2&#8243;][vc_column_text el_id=&#8221;advantages&#8221; el_class=&#8221;anker&#8221;]Anker[\/vc_column_text][vc_column_text]<\/p>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<h2>What you achieve:<\/h2>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_column_text]In terms of data encryption and secure logon to the operating system as well as specialist applications:<\/p>\n<ul>\n<li>Implementation of the Minimum Requirements for Risk Management (MaRisk)<\/li>\n<li>Fulfillment of banking supervisory requirements for IT (BAIT)<\/li>\n<li>Securing the industry-specific requirements for KRITIS sectors<\/li>\n<\/ul>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2>For whom is the application useful?<\/h2>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-dollar-sign&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]Financial Services Institutions[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/4&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-hand-holding-usd&#8221; color=&#8221;white&#8221; align=&#8221;center&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;3\/4&#8243;][vc_column_text]Credit institutions[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row el_class=&#8221;dreieck_unten&#8221; css=&#8221;.vc_custom_1637934442011{padding-bottom: 20px !important;}&#8221;][vc_column][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1632378043635{margin-top: 20px !important;}&#8221;]<\/p>\n<h2><\/h2>\n<h2>Use Case 1: <strong>MaRisk<\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text]It must be possible to assign non-personalized authorizations to an acting person without any doubt at any time (preferably in an automated manner). Deviations in justified exceptional cases and the resulting risks must be approved and documented. HiCrypt\u2122 Enterprise Services enables convenient single sign-on to encrypted shares of authorized persons or groups of persons as well as documentation of events.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2><\/h2>\n<h2>Use Case 2:\u00a0<strong>Brewer-Nash-Modell<\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text]Banks as well as service providers of banks are obliged to create secure and well-manageable data rooms to which only selected personnel have access. With HiCrypt\u2122, you reliably protect your data by storing it on encrypted network drives and protecting it with individual access concepts based on the Brewer-Nash model (also known as the Chinese Wall model) &#8211; regardless of your IT administration.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1590575572788{padding-top: 10px !important;padding-bottom: 10px !important;background-image: url(\/wp-content\/uploads\/sites\/3\/2020\/05\/breaker_grau-1.jpg?id=2374) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221;][vc_column][vc_column_text el_class=&#8221;anker&#8221; el_id=&#8221;preise&#8221;]Anker[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1632391138978{margin-bottom: 40px !important;}&#8221;]<\/p>\n<div class=\"wpb_text_column wpb_content_element vc_custom_1588598993636\">\n<div class=\"wpb_wrapper\">\n<h2>Need to act fast to secure your employees&#8217; home offices?<\/h2>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_column_text]<\/p>\n<p style=\"text-align: left;\">If you need to secure your employees&#8217; home offices quickly, for example, our <strong>&#8220;Get Ready Option&#8221;<\/strong> guarantees that we will develop and implement the desired standard product within <strong>just 15 working days<\/strong>.<\/p>\n<p>[\/vc_column_text][vc_column_text el_class=&#8221;download_button&#8221;]<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.digitronic.net\/en\/finance\/#request\">Contact us<\/a><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1632391362356{margin-top: 20px !important;}&#8221;]<\/p>\n<h2><\/h2>\n<h2>Use Case 3: <strong>Need-to-know-Principle<\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text]To maintain separation of functions and avoid conflicts of interest between personnel, use HiCrypt\u2122 Enterprise Services to easily implement AD authorization concepts in your digital vaults. The principle of economy is a pillar on which HiCrypt\u2122 Enterprise Services is built.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2><\/h2>\n<h2>Use Case 4: <strong>BaFin<\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text]The German Federal Financial Supervisory Authority (BaFin) audits banks to ensure that IT security measures have been implemented and complied with. Our solutions held up hundreds of times in ISO 27001 certification processes and were accepted by auditors.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text css=&#8221;.vc_custom_1632378076614{margin-top: 20px !important;}&#8221;]<\/p>\n<h2><\/h2>\n<h2>Use Case 5: <strong>Social Engineering<\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text]Not only is the threat from the outside real, but attacks on your employees&#8217; identities or the theft of their passwords are also serious threats. Protect yourself and your employees with advanced authentication using SmartLogon\u2122 and training from our expert IT security consultants at your facility or virtually.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2><\/h2>\n<h2>Use Case 6: <strong>Confidentiality<\/strong><\/h2>\n<p>[\/vc_column_text][vc_column_text]All IT systems, IT processes and other components of the information network must ensure IT security. This means that the integrity, availability, authenticity and confidentiality of data must be ensured at all times. Data encryption with HiCrypt\u2122 reliably maintains the confidentiality of sensitive information.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-cog&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1632131932711{margin-top: 20px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][vc_column_text css=&#8221;.vc_custom_1632391458037{margin-top: 20px !important;}&#8221;]<\/p>\n<h2><\/h2>\n<h2>Our promise as a manufacturer<\/h2>\n<p>[\/vc_column_text][vc_column_text]As a manufacturer and long-standing IT security expert, we are happy to work with you to develop customizations that best meet your specific requirements.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-shield-alt&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1632132034189{margin-top: 20px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][vc_column_text]<\/p>\n<h2><\/h2>\n<h2>Software and Support \u201eMade in Germany\u201c<\/h2>\n<p>[\/vc_column_text][vc_column_text]Software and support &#8220;Made in Germany&#8221; guarantee you: No backdoor access to your confidential data and shortest response times when you need our support.[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/3&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-address-card&#8221; color=&#8221;custom&#8221; size=&#8221;xl&#8221; align=&#8221;center&#8221; css=&#8221;.vc_custom_1632132167729{margin-top: 20px !important;}&#8221; custom_color=&#8221;#97be0d&#8221;][vc_column_text]<\/p>\n<h2><\/h2>\n<h2>Use existing technology<\/h2>\n<p>[\/vc_column_text][vc_column_text]Existing transponders or smart cards can usually be used to implement 2-factor authentication.\u00a0We are happy to check existing hardware for compatibility in order to avoid new purchases.[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2972&#8243; img_size=&#8221;200&#215;115&#8243; alignment=&#8221;center&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][vc_single_image image=&#8221;2970&#8243; img_size=&#8221;200&#215;115&#8243; alignment=&#8221;center&#8221;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_section css=&#8221;.vc_custom_1632388770323{margin-top: 80px !important;margin-bottom: 50px !important;}&#8221;][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_column_text]<\/p>\n<h2>Example scenario 2-factor authentication and data encryption in everyday practice:<\/h2>\n<h2><\/h2>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;1\/2&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_column_text]<\/p>\n<h3>1<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]The PC logon takes place by means of an authentication feature (token) and a short PIN. Smartcards, USB or Bluetooth tokens and even smartphones are suitable as tokens.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_column_text]<\/p>\n<h3>2<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]All logins can be logged and assigned to the respective user profile. If desired, individual specialist applications can be opened according to the profile.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_column_text]<\/p>\n<h3>3<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]Depending on the rights assigned, encrypted files can be viewed or edited in plain text and saved encrypted again. Unauthorized persons only get to see a cryptographic collection of data.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_column_text]<\/p>\n<h3>4<\/h3>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]Automatic logoff from the operating system, specialized applications, and encrypted files occurs when the token is removed or the user leaves the device.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner][vc_column_text el_class=&#8221;nicht_handy&#8221;]<\/p>\n<h2><\/h2>\n<h2>For digital freedom without risk!<\/h2>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;4553&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1591117630223{background-image: url(\/wp-content\/uploads\/sites\/3\/2020\/05\/breaker_grau-1.jpg?id=2374) !important;}&#8221;][vc_row][vc_column][vc_column_text el_id=&#8221;request&#8221; el_class=&#8221;anker&#8221;]Anker[\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1632391637794{margin-top: 35px !important;}&#8221;]<\/p>\n<h3>Our sales and support team will be happy to advise you on our IT security solutions for protecting your confidential customer and financial data. Simply contact us or arrange a presentation appointment.<\/h3>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=&#8221;6\/12&#8243;][vc_row_inner][vc_column_inner][vc_column_text]<\/p>\n<h3><strong>Make a request now:<\/strong><\/h3>\n<p>[\/vc_column_text][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8221;6\/12&#8243;][vc_column_text css=&#8221;.vc_custom_1637237298235{margin-bottom: 30px !important;}&#8221;]<\/p>\n<h3><strong>Get advice now:<\/strong><\/h3>\n<p>[\/vc_column_text][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-phone-alt&#8221; color=&#8221;mulled_wine&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text css=&#8221;&#8221;]<a class=\"later\" href=\"tel:+4937181539444\"><strong>+49 371 81539-444<\/strong><\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_icon icon_fontawesome=&#8221;fas fa-at&#8221; color=&#8221;mulled_wine&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;5\/6&#8243;][vc_column_text]<a class=\"later\" href=\"mailto:sales@digitronic.net\"><strong>sales@digitronic.net<\/strong><\/a>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner css=&#8221;.vc_custom_1635936085730{margin-top: 50px !important;}&#8221;][vc_column_inner width=&#8221;6\/12&#8243;][vc_single_image image=&#8221;9757&#8243; alignment=&#8221;center&#8221; css=&#8221;&#8221; el_class=&#8221;bild_rund&#8221;][vc_column_text css=&#8221;.vc_custom_1767799288669{margin-top: 20px !important;}&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>Alexander Woeschka<\/strong><br \/>\nManaging Director<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;6\/12&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column el_class=&#8221;bild&#8221;][vc_single_image image=&#8221;4523&#8243; img_size=&#8221;full&#8221;][\/vc_column][\/vc_row][vc_section][vc_row][vc_column width=&#8221;4\/5&#8243;][vc_column_text el_id=&#8221;contact&#8221; el_class=&#8221;anker&#8221;]Anker[\/vc_column_text][vc_column_text] IT security for banks [\/vc_column_text][vc_column_text css=&#8221;.vc_custom_1632390657445{margin-bottom: 20px !important;}&#8221;]Cybercrime has long been a real threat to the financial sector. In order to counter this threat by improving the IT security of banks in particular, the legislator is holding the financial sector, which is particularly at risk, accountable. The industry-specific &hellip; <a href=\"https:\/\/www.digitronic.net\/en\/finance\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Finance&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-4557","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT security for banks - the fight against cybercrime - digitronic<\/title>\n<meta name=\"description\" content=\"Two-factor authentication &amp; encryption improve IT security in banks - practical use cases with solutions from digitronic\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitronic.net\/en\/finance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT security for banks - the fight against cybercrime\" \/>\n<meta property=\"og:description\" content=\"Two-factor authentication &amp; encryption improve IT security in banks - practical use cases with solutions from digitronic\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitronic.net\/en\/finance\/\" \/>\n<meta property=\"og:site_name\" content=\"digitronic\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T12:54:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/11\/finanzwesen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"IT security for banks - the fight against cybercrime\" \/>\n<meta name=\"twitter:description\" content=\"Two-factor authentication &amp; encryption improve IT security in banks - practical use cases with solutions from digitronic\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/11\/finanzwesen.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/finance\\\/\",\"url\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/finance\\\/\",\"name\":\"IT security for banks - the fight against cybercrime - digitronic\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/finance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/finance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitronic.net\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2026\\\/03\\\/Alex_Bild_FINAL-Kopie-scaled.jpg\",\"datePublished\":\"2021-09-23T10:15:49+00:00\",\"dateModified\":\"2026-03-05T12:54:52+00:00\",\"description\":\"Two-factor authentication & encryption improve IT security in banks - practical use cases with solutions from digitronic\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/finance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitronic.net\\\/en\\\/finance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/finance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitronic.net\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2026\\\/03\\\/Alex_Bild_FINAL-Kopie-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitronic.net\\\/wp-content\\\/uploads\\\/sites\\\/3\\\/2026\\\/03\\\/Alex_Bild_FINAL-Kopie-scaled.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/finance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.digitronic.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Finance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitronic.net\\\/#website\",\"url\":\"https:\\\/\\\/www.digitronic.net\\\/\",\"name\":\"digitronic\",\"description\":\"Spezialist f\u00fcr Datensicherheit und 2-Faktor-Authentifzierung\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitronic.net\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT security for banks - the fight against cybercrime - digitronic","description":"Two-factor authentication & encryption improve IT security in banks - practical use cases with solutions from digitronic","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitronic.net\/en\/finance\/","og_locale":"en_US","og_type":"article","og_title":"IT security for banks - the fight against cybercrime","og_description":"Two-factor authentication & encryption improve IT security in banks - practical use cases with solutions from digitronic","og_url":"https:\/\/www.digitronic.net\/en\/finance\/","og_site_name":"digitronic","article_modified_time":"2026-03-05T12:54:52+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/11\/finanzwesen.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"IT security for banks - the fight against cybercrime","twitter_description":"Two-factor authentication & encryption improve IT security in banks - practical use cases with solutions from digitronic","twitter_image":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2021\/11\/finanzwesen.jpg","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.digitronic.net\/en\/finance\/","url":"https:\/\/www.digitronic.net\/en\/finance\/","name":"IT security for banks - the fight against cybercrime - digitronic","isPartOf":{"@id":"https:\/\/www.digitronic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitronic.net\/en\/finance\/#primaryimage"},"image":{"@id":"https:\/\/www.digitronic.net\/en\/finance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-scaled.jpg","datePublished":"2021-09-23T10:15:49+00:00","dateModified":"2026-03-05T12:54:52+00:00","description":"Two-factor authentication & encryption improve IT security in banks - practical use cases with solutions from digitronic","breadcrumb":{"@id":"https:\/\/www.digitronic.net\/en\/finance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitronic.net\/en\/finance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitronic.net\/en\/finance\/#primaryimage","url":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-scaled.jpg","contentUrl":"https:\/\/www.digitronic.net\/wp-content\/uploads\/sites\/3\/2026\/03\/Alex_Bild_FINAL-Kopie-scaled.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitronic.net\/en\/finance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.digitronic.net\/en\/"},{"@type":"ListItem","position":2,"name":"Finance"}]},{"@type":"WebSite","@id":"https:\/\/www.digitronic.net\/#website","url":"https:\/\/www.digitronic.net\/","name":"digitronic","description":"Spezialist f\u00fcr Datensicherheit und 2-Faktor-Authentifzierung","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitronic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/pages\/4557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/comments?post=4557"}],"version-history":[{"count":6,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/pages\/4557\/revisions"}],"predecessor-version":[{"id":9541,"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/pages\/4557\/revisions\/9541"}],"wp:attachment":[{"href":"https:\/\/www.digitronic.net\/en\/wp-json\/wp\/v2\/media?parent=4557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}