Multi-factor authentication (MFA)

Multi-factor authentication (MFA) Multi-factor authentication (MFA) is a security procedure that requires users to log in with at least two different factors. In addition to a password, additional proof is required, e.g. a code on the smartphone. What does MFA mean in detail? The MFA combines different types of evidence: Knowledge (e.g. password) Possession (e.g. […]

Windows 10 is expiring – act now before it’s too late

Support for Windows 10 is coming to an end. All users are encouraged to switch to the Windows 11 operating system.

The Remote Desktop Protocol (RDP) is undoubtedly an invaluable tool for the modern IT infrastructure. It allows users to connect to and control remote computers over the network. This function is particularly popular in companies for IT administration, whether for support or remote maintenance of systems.

In Focus: Business Email Compromise

An email appears on a screen that could have potentially malicious content or has been manipulated by cybercriminals.

Business email compromise is a targeted form of digital fraud in which attackers exploit internal business processes through manipulated or compromised email communication. The goal is to redirect payments, steal sensitive data or manipulate processes.

Critical vulnerability in Microsoft SharePoint

There is a critical vulnerability in Microsoft Windows (CVSS 9.8) that affects almost all current Windows and server versions and allows attackers to execute malicious code with system privileges without user interaction – an acute risk to your IT infrastructure

Critical vulnerability in Windows authentication

There is a critical vulnerability in Microsoft Windows (CVSS 9.8) that affects almost all current Windows and server versions and allows attackers to execute malicious code with system privileges without user interaction – an acute risk to your IT infrastructure

In focus: Car dealerships are easy victims of e-mail fraud

Companies in various industries nowadays rely heavily on email communication and online transactions for their business operations. However, as efficient as this way of doing business is, it also opens the door to cybersecurity threats, such as email and wire fraud.