Responsible Disclosure
Responsible Disclosure Translated, Responsible Disclosure means “responsible disclosure”. This is about the announcement of newly discovered security vulnerabilities. It should be done responsibly. This means that cybercriminals can exploit the discovered vulnerabilities as little as possible. What does Responsible Disclosure mean in detail? There are independent ethical hackers who check websites, programs, apps and the […]
Remote Protocols
Remote Protocols Remote protocols are communication protocols that can be used to remotely control or manage computers, servers, or other IT systems over a network. They allow access to devices as if you were sitting directly in front of them – even though they are physically distant. What are remote protocols exactly? Remote protocols govern […]
Ransomware
Ransomware Refers to extortionate malware. Cybercriminals use ransomware to make files, hard drives, computers or entire networks inaccessible to their legitimate users and demand a ransom to release the files, etc. The term is made up of the English words “ransom” for ransom and “-ware” as a word part of software, i.e. program. What does […]
Phishing simulation
Phishing simulation In a phishing test, recipients receive fake scam emails or phone calls to check whether they are falling for tricks from criminals. In this way, security incidents are to be avoided. Here’s how a phishing simulation works on Perseus: In a simulated scam email, we pretend to be a known person or service […]
Phishing
Phishing Criminals try to obtain confidential company data with the help of fraudulent emails, fake websites and other methods. By pretending to be a well-known person (colleague, boss) or organization (bank, service provider), the scammers exploit the victim’s trust to willingly disclose information. Where do I encounter phishing in my everyday work? The working day […]
Personal data
Personal data Personal data is information relating to an identified or identifiable natural person. This includes name, e-mail address, telephone number or even an IP address. As soon as information directly or indirectly allows conclusions to be drawn about a person, it is considered personal. What counts as personal data?Typical personal data is: Name, address, […]
Open Threat Exchange
Open Threat Exchange Open Threat Exchange (OTX) is an open platform for sharing information about cyber threats. It is operated by the security company AlienVault (now part of AT&T Cybersecurity) and is designed to quickly and collaboratively share insights about attacks, vulnerabilities, malware and attackers. What is OTX exactly? OTX is a threat intelligence network […]
Password Manager
Password Manager Password managers are programs that help to implement the requirements for secure passwords: to use a unique, complex, multi-digit password for each user account, which consists of letters, numbers and special characters. As the name suggests, password manager programs take over the management of these unique passwords. Users then only have to remember […]
Open Ports
Open Ports An “open port” is an access point on a computer or server that is reachable and active for traffic. Programs and services communicate with each other via ports – so they are necessary, but also potential vulnerabilities. What does that mean in detail? A port works like a door: If it is open, […]
Employee sensitization
Employee sensitization Individual employees are the last line of defense in the IT security of companies. In addition to technical precautions, further training and permanent sensitization of employees is an important protective factor against cyber risks. As part of an employee awareness program, all employees in your company – from CEOs to interns – are […]