No backup – no pity.

Do you know this too? You are engrossed in a project, working on an important document, are in a productive peak phase and suddenly: standstill. The mouse cursor cannot be moved, the computer freezes and the supposedly only way to continue the project is to restart the computer. At this point, at the latest, the inner reproach spreads: “If only I had made a backup copy…”. We know better, but what is holding us back?

Hacked – what now? Incident response at a glance

In the event of a cyber emergency, it is important to have a fast, deliberate response – incident response. What does it involve? You can find out here. We also give a few concrete tips on how to optimize them.

Microsoft Exchange: Close gaps quickly!

09.03.2021 Current hazard warning. Measures are urgently needed. Critical vulnerabilities in Microsoft’s Exchange Server email platform Tens of thousands of companies and authorities affected, including four federal agencies BSI: Install security updates provided by Microsoft as soon as possible Due to a security vulnerability in Microsoft Exchange servers, tens of thousands of email servers of […]

AI in Cyber Security: Attack Weapon and Protective Shield at the Same Time

Artificial intelligence – or “AI” for short – is intended to replicate human thinking in a way that is as automated or mechanized as possible. AI is also playing an increasingly important role in cyber security: it is used both as an attack weapon and to defend against cyberattacks. Which side will win in the end?

Cyber awareness leads to more resilience

Not only conscious, but also resilient: An important building block in a cyber security strategy is employee awareness, the awareness that and which cyber threats exist. Coupled with the knowledge of where the dangers lurk, what they look like, how to behave in an emergency and how best to protect yourself, cyber resilience, the resistance of companies to cyber threats, can be significantly increased.

“Information security must be made a top priority” (1)

In IT, forensic experts are among the most sought-after specialists of all, both by investigative authorities and in companies. They take care of securing evidence and evidence in the event of a cyberattack. We asked our forensics expert Julian Krautwald about his work. In the first part of our conversation, we learn: What does an IT forensic scientist actually do?

Corona vaccines: Cyber attacks on supply chains

As soon as the first positive news about Corona vaccines arrived, the cybercriminals got ready to get started: Corona vaccinations as a hook for phishing attacks, espionage and sabotage of research results, attacks on supply chains and dubious offers of counterfeit vaccines on the darknet – the cybercriminals quickly instrumentalized the topic for themselves. How can they be stopped?

We won the battle, but not the war

In recent years, the malicious botnet Emotet has consistently topped the rankings of the most dangerous cyber threats. Now the malware, which has been spreading as a Trojan since 2014, has been rendered harmless as part of a concerted action by Europol and the BKA. What does this mean for the current threat situation? Is the risk of cyberattacks now lower? Yes and no, because there are countless other attackers and cybercriminals lurking out there.

Clubhouse app: Digital regulars’ table or exclusive salon?

Regulars’ table, conference call or live podcast 2.0: In recent weeks, the new mobile app “Clubhouse” has triggered a real hype. But in terms of data protection, the app still has some weaknesses and risks. What’s the deal with this new platform? Is it safe to use? Can it also be used for business? Here are the most important answers to the SoMe hype of the hour.

“The additional benefits of a cyber policy are essential selling points!”

Commercial and personal cyber insurance is becoming increasingly sought after in view of the increasing threat of cybercrime. But an insurance policy alone is not enough for sustainable protection. It’s all about the additional benefits of a cyber policy: good emergency management or effective employee awareness training can make all the difference.