Admins should close the proxy shell gaps in the Exchange server with security updates. The cyber criminals are currently targeting Exchange servers and are using Conti Ransomware to encrypt business data. Security updates have been available since April. Sophos cites in their report that they have observed attacks where cybercriminals use the proxyshell known vulnerabilities… […]
e-Privacy – Does the wait end?
After four years of negotiations, the EU-Council reached a common position in February 2021. The regulation is now in a trilogue with the Council, the Commission and Parliament. The e-Privacy Regulation applies to all interpersonal communication services — including chat systems such as WhatsApp, Skype, etc. on the website. It governs the provision of communication… […]
3 years GDPR – Still not an integral part of everyday business?
The GDPR came into force on 25 May 2018. The aim of this Act was to protect the data of each EU citizen in accordance with a strict and an uniform legislation and to give each person control over whether and how their personal data is used. Even after three years, many companies have not… […]
AI support to prevent hacker attacks.
Every day, there are numerous reports in media of ransomware attacks. It’s no longer a question of whether your company is under attack, but when it hits your company network and you have to deal with data theft and extortion. Many companies still rely on preventive measures and often attacks by cybercriminals remain undetected for… […]
Prevent cyberattacks?
Not every entrepreneur is aware of his responsibility when it comes to data security. We receive news in media reporting about ransomware attacks every day. What is ransomware? Ransomware is malware that blocks your computer or encrypts data so you can no longer access your data. As soon as the malware is active, the perpetrators… […]
Tips for working with data safely.
If you are on the Internet, you need to detect fake news and unsafe websites to protect yourself from phishing. We give you a few tips that you should implement in your environment. HTTPS Websites An inexhaustible variety of information is available on the Internet. However, not all websites are safe. A reputable and, most… […]
security risk – personal devices in the home office.
In many companies, it is common for employees to use their own devices for professional purposes. This practice is called BYOD (Bring Your Own Device). But what happens if such a device puts the security of the infrastructure at risk and the employees’ private devices need to be examined in IT forensic? Is that allowed?… […]
Ransomware – data taken hostage!!
According to the Official Annual Cybercrime Report of 2019, every 14 seconds, an entrepreneur will be the victim of a ransomware attack. Now Brown-Forman, US spirits manufacturer and owner of Jack Daniel’s brands, has also been the victim of a ransomware attack. Ransomware is constantly evolving. Entrepreneurs also need to evolve security strategies to protect… […]
Mandatory guest registration in restaurants violates GDPR
The registration of guests introduced by the City of Vienna on September 28, 2020 is a violation of data protection regulations. With this ordinance, the city wanted to extend the curfew from 10 p.m. for Viennese restaurants. The data protection authority approves a complainant. The decision refers to the Vienna Contact Tracing regulation as well… […]