Useful information on cyber security, data protection and much more

Case Studies

Our case studies in cybersecurity and data protection for SMEs demonstrate how businesses successfully manage real cyber risks. Discover how we identify vulnerabilities, implement effective security measures, and create holistic solutions in collaboration with cyber insurance providers.

Through real-world examples, you gain practical insights into IT security, GDPR compliance, and cyber resilience—clear, transparent, and applicable to your business.

Mann und Frau feiern erfolgreiche Partnerschaft im Bereich der IT-Sicherheit
An email appears on a screen that could have potentially malicious content or has been manipulated by cybercriminals.

In Focus: Business Email Compromise

Business email compromise is a targeted form of digital fraud in which attackers exploit internal business processes through manipulated or compromised email communication. The goal is to redirect payments, steal sensitive data or manipulate processes.

Read More »

In focus: IT security incident across three corners

A restaurant was informed about an IT security incident at a software provider used whose platform is used for ordering, administration and payments. Attackers gained unauthorized access to personal customer data, including names, email addresses and, in some cases, credit card details. The trigger was the misconduct of an external accounting employee who accidentally entered her access data on a fake login page that looked deceptively similar to the original platform.

Read More »

In Focus: Quadruple Email Scam Scam

Cybercriminals rely on email scams. But anyone who thinks that criminals only send clumsy phishing attempts with poorly written, faulty emails is mistaken. Criminals sometimes put a lot of effort into planning, designing, and executing email fraud. The experts of the Incident Response Management Team have recorded an increase in these attacks. To show you how sophisticated some of these attacks are, we present the following case. You will see the attackers send fake emails, misuse the names of well-known companies for their scam, invent products, create fake websites, copy real companies, and more.

Read More »