Companies are currently receiving emails claiming that the recipient has received a new fax document. Employees are prompted to click on a link to make the document visible. Attention!!!!! This is an attack on the Microsoft account of employees. These mails seem particularly trustworthy because they use domain names of the affected company in the… […]
When Amazon calls – hang up!
Currently, there is an increasing number of calls from criminals pretending to be Amazon employees and claiming that their Amazon account has been hacked. They state that the reason for the call is that suspicious orders have been detected on your Amazon account. They then offer you to cancel the order and “help protect your… […]
Attacks on Exchange Server continue to increase
Admins should close the proxy shell gaps in the Exchange server with security updates. The cyber criminals are currently targeting Exchange servers and are using Conti Ransomware to encrypt business data. Security updates have been available since April. Sophos cites in their report that they have observed attacks where the cybercriminals use the ProxyShell known… […]
3 years DSGVO – Still no fixed component in the everyday business life?
The GDPR came into force on 25 May 2018. The aim of this Act was to protect the data of each EU citizen in accordance with a strict and an uniform legislation and to give each person control over whether and how their personal data is used. Even after three years, many companies have not… […]
Repel hacker attacks with AI support
Every day, there are numerous reports in media of ransomware attacks. It’s no longer a question of whether your company is under attack, but when it hits your company network and you have to deal with data theft and extortion. Many companies still rely on preventive measures and often attacks by cybercriminals go undetected for… […]
Tips for working securely with data
If you are on the Internet, you need to detect fake news and unsafe websites to protect yourself from phishing. We give you a few tips that you should implement in your environment. HTTPS Websites An inexhaustible variety of information is available on the Internet. However, not all websites are safe. A reputable and, most… […]
IT security is teamwork
When it comes to data security, collaboration is required from all stakeholders. Even if the technical homework is done, it is important to stay on the ball. Simply shifting responsibility to the IT department is not enough. People are creative and therefore entrepreneurs must be clear that they bear the responsibility and must ensure that… […]
Right of objection
The right to object is available to any person concerned. The data of the data subject/the Once the right to object has been exercised, the data subject may not further are processed. However, there are also cases in which the person responsible can reject the opposition: the Controller may demonstrate compelling reasons for the processing… […]
Correct handling of requests from affected parties
The response to data subject requests must include not only the data you have stored about the person making the request, but also information about WHY you process the data, HOW LONG the data is stored, and information about the rights of data subjects (see Art. 15). Die Auskunft darf Rechte und Freiheiten anderer nicht… […]