Admins should close the proxy shell gaps in the Exchange server with security updates. The cyber criminals are currently targeting Exchange servers and are using Conti Ransomware to encrypt business data. Security updates have been available since April. Sophos cites in their report that they have observed attacks where cybercriminals use the proxyshell known vulnerabilities… […]
3 years GDPR – Still not an integral part of everyday business?
The GDPR came into force on 25 May 2018. The aim of this Act was to protect the data of each EU citizen in accordance with a strict and an uniform legislation and to give each person control over whether and how their personal data is used. Even after three years, many companies have not… […]
AI support to prevent hacker attacks.
Every day, there are numerous reports in media of ransomware attacks. It’s no longer a question of whether your company is under attack, but when it hits your company network and you have to deal with data theft and extortion. Many companies still rely on preventive measures and often attacks by cybercriminals remain undetected for… […]
Tips for working with data safely.
If you are on the Internet, you need to detect fake news and unsafe websites to protect yourself from phishing. We give you a few tips that you should implement in your environment. HTTPS Websites An inexhaustible variety of information is available on the Internet. However, not all websites are safe. A reputable and, most… […]
IT-Security is Teamwork
When it comes to data security, all parties involved need to work together. Even after you’ve done your work, it’s important to stay tuned. Simply shifting the responsibility to the IT department will not be enough. People are creative and that is why entrepreneurs has to be clear that they bears the responsibility and also… […]
Proper handling of patient inquiries
The response to data subject requests must not only include the information you have stored about the requesting person, but also information about WHY you process the data, how long the data is stored, and information about the rights of the data subject (see Art. 15). The information may not affect the rights and freedoms… […]
Expert tip: How to avoid a Data Breach in your business!
Negative press can trigger a flood of inquiries as a result of a reported data breach. Take action to prevent a data breach in your organization. Some suggestions from our expert: Alle Festplatten und Memorysticks, auf denen personenbezogene Daten sein könnten, verschlüsseln. Mit Windows 10 reichen die Standardfeatures von Windows, um eine ausreichende Sicherheit herzustellen…. […]
Expert tip for secure passwords:
Do not use a password twice. Do not change your password regularly, it will just make you forget your password and then pick the easy one that can be hacked quickly. Special characters do not automatically make a password more secure! The safest: the longer the password, the better. We would advise you to use… […]
Expert Tip: Encrypt your data carries
Do not use USB sticks that are not encrypted, unless the publication of data on the stick is not a problem for you. Mind that unencrypted personal data is a violation of the GDPR. You can encrypt disks using Windows 10 on-board tools. Alternatively, you can encrypt disks with open source tools like Veracrypt. How… […]