Responsible Disclosure

Responsible Disclosure Translated, Responsible Disclosure means “responsible disclosure”. This is about the announcement of newly discovered security vulnerabilities. It should be done responsibly. This means that cybercriminals can exploit the discovered vulnerabilities as little as possible. What does Responsible Disclosure mean in detail? There are independent ethical hackers who check websites, programs, apps and the […]

Remote Protocols

Remote Protocols Remote protocols are communication protocols that can be used to remotely control or manage computers, servers, or other IT systems over a network. They allow access to devices as if you were sitting directly in front of them – even though they are physically distant. What are remote protocols exactly? Remote protocols govern […]

Ransomware

Ransomware Refers to extortionate malware. Cybercriminals use ransomware to make files, hard drives, computers or entire networks inaccessible to their legitimate users and demand a ransom to release the files, etc. The term is made up of the English words “ransom” for ransom and “-ware” as a word part of software, i.e. program. What does […]

Phishing simulation

Phishing simulation In a phishing test, recipients receive fake scam emails or phone calls to check whether they are falling for tricks from criminals. In this way, security incidents are to be avoided. Here’s how a phishing simulation works on Perseus: In a simulated scam email, we pretend to be a known person or service […]

Phishing

Phishing Criminals try to obtain confidential company data with the help of fraudulent emails, fake websites and other methods. By pretending to be a well-known person (colleague, boss) or organization (bank, service provider), the scammers exploit the victim’s trust to willingly disclose information. Where do I encounter phishing in my everyday work? The working day […]

Personal data

Personal data Personal data is information relating to an identified or identifiable natural person. This includes name, e-mail address, telephone number or even an IP address. As soon as information directly or indirectly allows conclusions to be drawn about a person, it is considered personal. What counts as personal data?Typical personal data is: Name, address, […]

Open Threat Exchange

Open Threat Exchange Open Threat Exchange (OTX) is an open platform for sharing information about cyber threats. It is operated by the security company AlienVault (now part of AT&T Cybersecurity) and is designed to quickly and collaboratively share insights about attacks, vulnerabilities, malware and attackers. What is OTX exactly? OTX is a threat intelligence network […]

Password Manager

Password Manager Password managers are programs that help to implement the requirements for secure passwords: to use a unique, complex, multi-digit password for each user account, which consists of letters, numbers and special characters. As the name suggests, password manager programs take over the management of these unique passwords. Users then only have to remember […]

Open Ports

Open Ports An “open port” is an access point on a computer or server that is reachable and active for traffic. Programs and services communicate with each other via ports – so they are necessary, but also potential vulnerabilities. What does that mean in detail? A port works like a door: If it is open, […]

Employee sensitization

Employee sensitization Individual employees are the last line of defense in the IT security of companies. In addition to technical precautions, further training and permanent sensitization of employees is an important protective factor against cyber risks. As part of an employee awareness program, all employees in your company – from CEOs to interns – are […]