The global Fortune 500 technology company DXC Technology surveyed 300 IT decision-makers on cybersecurity in Germany, Austria, and Switzerland. Read the survey results here ...
Time and again, as in 2025, there are security gaps in AI hacking attacks.
(Image: DXC Technology)
DXC Technology supports globally active companies in operating their mission-critical systems and processes while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private, and hybrid clouds. Survey result: Companies should prepare for the following five cybersecurity trends in 2025:
1.AI as a Cyberweapon for Attack and Defense Cybercriminals are increasingly using artificial intelligence (AI) to improve the success rates of their hacking attacks. Phishing emails are evolving from simple deception mails to much more credible letters: attackers, for example, use so-called deepfakes—a form of generative AI—to create convincing fake texts, images, or sounds. "Companies should take the new risks of AI-supported attacks very seriously and adjust their cyber defense accordingly," says Dr. Bruno Messmer, AI expert at DXC Technology. "It is advisable to systematically incorporate AI tools into the company's security strategy and use them for analyzing and detecting attacks, as well as selecting and training personnel." The good news: AI can also be used as a powerful tool to combat cybercrime. However, currently, about one in three companies in Germany still refrains from incorporating AI into the defense against hacking attacks—it's even about one in two in Austria and Switzerland. This is according to the latest DXC survey "Securing a Digital Future" conducted among N=300 specialists and executives who decide on the company's digitalization.
2. New Vulnerabilities Employees are increasingly online with smartphones, tablets, laptops, or other devices and a larger number of applications. Professional usage behavior is mixing with private activities. With the increase in apps, SMS services, and social channels, new vulnerabilities emerge for hackers to access sensitive data. This starts with retrieving live updates and extends to the seemingly harmless forwarding of links on WhatsApp to sharing job updates on LinkedIn. In this complex scenario of online activities, the classic cyber defense of companies is becoming less suitable for adequately protecting employees. A "Zero-Trust Strategy" offers a response to such a threat situation. This cybersecurity model consistently requires users to authorize at every level of network access. Even if a particular device is compromised, it protects sensitive workplace resources. It is important to communicate the mindset regarding risks to employees so that all users work together in implementing the strategy. Companies still need to catch up in sensitizing employees to new entry points for hacker attacks: In Germany, only just over half of the companies conduct regular exercises for cyberattack scenarios (56 percent). In Austria, it is 63 percent, and in Switzerland, it is 66 percent of companies.
3. Critical Infrastructures at Risk The number of cyberattacks on critical infrastructures is expected to continue rising, according to expert forecasts. Digital control systems of factories, power plants, and hospitals are increasingly becoming targets of hacker attacks. Media reports already show that cybercriminals—sometimes even on behalf of state actors—proceed without regard for consequences. The economy is already engaged in scrutinizing their entire operations and equipping them with cybersecurity measures. The trend towards increased security is progressing gradually: For instance, 76 percent of companies in Germany now have an emergency plan for hacker attacks. Two years ago, the rate was only 52 percent. According to the DXC survey, in Austria and Switzerland, it's currently just under 70 percent.
4. Increased Threat to Supply Chains Cybercriminals are specifically targeting supply chains. Instead of attacking individual end users, the network of companies, their suppliers, and customers within an industry is being focused on. Threatened are corporate data, access credentials, customer information, source code, and other highly sensitive data that can fall into the hands of individual criminals or state-supported hackers. Such attacks can have profound impacts on entire sectors that are digitally interconnected through the supply chain. In cyber defense, it will become increasingly important to include third parties in risk management. Companies need an overview of who they are doing business with. For this reason, DXC security experts manage security risks associated with all third parties—including customers, vendors, suppliers, partners, and all network participants. This is also a particular focus of the NIS-2 directive of the EU, which is currently being implemented in the member states. Companies in the DACH region are differently sensitized to this risk: In Germany, 76 percent of companies regularly scrutinize their suppliers for so-called "supply chain attacks" and attacks on third parties. In Switzerland, it is only 62 percent, and in Austria, 54 percent.
5. AI Consolidates Forces The shortage of skilled personnel for trained cybersecurity staff is already a challenge for companies today. At the same time, existing IT security teams face increasingly complex threat scenarios. Companies are well advised to expand the candidate pool for cybersecurity tasks and reskill or further develop their own employees through on-the-job training programs. Colleagues who may not have the required expertise but possess analytical potential, problem-solving skills, and technical know-how are suitable for this. With this staff, the first line of defense against potential cyber threats can be strengthened. AI tools play a special role in such projects. AI and machine learning support the teams working with a high workload with quickly available expertise. Security analysts, identity management experts, and incident responders are relieved of routine tasks by AI and can better focus on important case decisions. An incentive for internal talent search is employee training in IT security: 75 percent of companies in Germany conduct such courses regularly – an increase of around 20 percentage points in the past two years. In Austria, 77 percent offer regular training and in Switzerland, 66 percent, according to the results of the DXC survey.
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.
* Christina Trauntschnig is Director of Marketing and Communications Central, Northern & Eastern Europe at DXC Technology Austria in 1120 Vienna (Austria), Tel. +43 676 7868804, ctrauntschni@dxc.com