Data security

Data security Data security is given when the confidentiality, integrity and availability of data is ensured. The term is also used synonymously with “information security”. What does the term data security mean in detail? Confidentiality: The data is protected against unauthorized access. Integrity: The data is secured against destruction and loss. Availability: The data can […]

Cyber incident

Cyber incident A cyber incident is any event that affects your stored information or your IT resources and could cause significant damage to your business. The range of cyber incidents is wide, including malware infections, extortion, theft of confidential data, and misuse of bank accounts. What does the term cyber incident mean in detail? According […]

Cybersecurity

Cybersecurity Protection of information technology devices (e.g. computers or smartphones) and systems from the dangers of decommissioning, manipulation or the outflow of data through cyberspace. What does the term cybersecurity mean in detail? The topic of cybersecurity is of great importance at the individual, local, national and international level. This is because it can prevent […]

Cyber risk

Cyber risk Cyber risk is the possibility that something could happen to the information or IT components stored in your company that would cause significant damage to your company. Risk is measured at two levels: How badly something could hurt your business and how likely it is. What does the term cyber risk mean in […]

Cybercrime

Cybercrime Refers to crimes committed by or against information technology. In most cases, the Internet is used for this purpose. What does that mean in detail? The field of cybercrime encompasses a wide range of crimes, including: Data theft, e.g. of usernames and passwords, identity theft and fraud, e.g. through CEO fraud, fraud attempts, e.g. […]

Cryptojacking

Cryptojacking Composed of two abbreviated English terms: The component “crypto” is derived from the term “cryptocurrencies” (in German: cryptocurrencies). It refers to virtual currencies such as Bitcoin. The word “jacking” comes from the term “hijacking”, to kidnap, to hijack German. Cryptojacking is the process in which a cybercriminal hijacks resources from your computer or company […]

Credential Stuffing

Credential Stuffing Credential stuffing is the automated use of revealed username and password combinations to illegally gain access to user accounts and, if necessary, take them over completely. What does the term credential stuffing mean in detail? The term “credential stuffing” is made up of “credentials” and “stuffing”. With this procedure, the login mask of […]

CEO-Fraud

CEO-Fraud CEO fraud, also known as CEO fraud or “fake president” case, is a popular spear phishing scam. In this case, employees are asked in fake e-mails by their alleged superiors, for example, to transfer a certain sum of money or to disclose sensitive data. CEO fraud focuses on imitating everyday professional situations. In hierarchical […]

BYOD – Bring Your Own Device

BYOD – Bring Your Own Device Bring Your Own Device, or BYOD for short, refers to the use of private devices in professional life. Usually, this refers to smartphones, tablets and laptops. What does BYOD mean in detail? The most important feature of BYOD is the mixing of professional and private use. This can result […]

Federal Office for Information Security (BSI)

Federal Office for Information Security (BSI) Is the cybersecurity authority of Germany. The BSI is responsible for the digital information security of the state, business and society. Its tasks include the prevention and detection of cyber risks as well as appropriate responses to them. For citizens, entrepreneurs, authorities and politicians, the BSI is also a […]