Regarding data protection in the cloud computing environment, there are additional risks due to external service providers and data centers. The data is stored on systems external to the company and, since it is accessible via the Internet, there are additional data protection requirements. The advantages of cloud services such as savings on hardware and… […]
Attacks on Exchange Server continue to increase
Admins should close the proxy shell gaps in the Exchange server with security updates. The cyber criminals are currently targeting Exchange servers and are using Conti Ransomware to encrypt business data. Security updates have been available since April. Sophos cites in their report that they have observed attacks where the cybercriminals use the ProxyShell known… […]
3 years DSGVO – Still no fixed component in the everyday business life?
The GDPR came into force on 25 May 2018. The aim of this Act was to protect the data of each EU citizen in accordance with a strict and an uniform legislation and to give each person control over whether and how their personal data is used. Even after three years, many companies have not… […]
Repel hacker attacks with AI support
Every day, there are numerous reports in media of ransomware attacks. It’s no longer a question of whether your company is under attack, but when it hits your company network and you have to deal with data theft and extortion. Many companies still rely on preventive measures and often attacks by cybercriminals go undetected for… […]
Prevent cyberattacks?
Not every entrepreneur is aware of his responsibility when it comes to data security. We receive news in media reporting about ransomware attacks every day. What is ransomware? Ransomware is malicious software that locks your computer and encrypts data so that you can no longer access your data. “Ransom” comes from the English language and… […]
Tips for working securely with data
If you are on the Internet, you need to detect fake news and unsafe websites to protect yourself from phishing. We give you a few tips that you should implement in your environment. HTTPS Websites An inexhaustible variety of information is available on the Internet. However, not all websites are safe. A reputable and, most… […]
Security gap – private devices in the home office
In many companies, it is common for employees to use their own devices for work purposes. The keyword is BYOD (Bring Your Own Device). But what happens if such a device compromises the security of the infrastructure and the private devices of employees have to be examined for IT forensics? Is that allowed? Many companies… […]
IT security is teamwork
When it comes to data security, collaboration is required from all stakeholders. Even if the technical homework is done, it is important to stay on the ball. Simply shifting responsibility to the IT department is not enough. People are creative and therefore entrepreneurs must be clear that they bear the responsibility and must ensure that… […]