Wissenswertes rund um die Themen Cybersicherheit, Datenschutz u.v.m.

Medien & Inhalte

Hier finden Sie aktuelle Blogbeiträge, Gefahrenwarnungen, ein umfassendes Cyberlexikon sowie praxisnahe Fallstudien und Leitfäden – kompakt aufbereitet, um Sie bei der sicheren Gestaltung Ihrer digitalen Arbeitswelt zu unterstützen.

Support for Windows 10 is coming to an end. All users are encouraged to switch to the Windows 11 operating system.

Windows 10 is expiring – act now before it’s too late

The Remote Desktop Protocol (RDP) is undoubtedly an invaluable tool for the modern IT infrastructure. It allows users to connect to and control remote computers over the network. This function is particularly popular in companies for IT administration, whether for support or remote maintenance of systems.

Weiterlesen »

How Cyber Risk Assessments Optimize SMB IT Security

For several years now, cyber attacks have been one of the biggest business risks for German companies. Above all, the negative effects, such as data loss or long-lasting business interruptions, are causing problems for the companies. For some, a cyber attack can even threaten their existence. Reducing one’s own cyber risk and thus avoiding cyber attacks should be at the top of the priority list for companies, especially small and medium-sized enterprises.

Weiterlesen »

Unveiling the Dark Web: Phishing as a Service (PhaaS)

In the depths of the dark web, a market is thriving where illegal services are offered to those willing to pay a price. Among the services, phishing as a service (PhaaS) proves to be a particularly popular machine that offers access to cybercriminal craft to anyone who has a score to settle or wants to enrich themselves in an illegal way.

Weiterlesen »

A separation doesn’t always have to hurt!

“Never change a winning team”. That’s the saying. That this attitude is not always advantageous is shown by cyber incidents that occur due to outdated technologies and unpatched applications. Surveys now show that the modernization of IT infrastructures in particular is at the top of the priority list of IT expert teams.

Weiterlesen »

Deep Fakes – Reality vs Manipulation

Ransomware attacks are ubiquitous. Whether through media coverage, stories from the work environment or acquaintances – there is no getting around the topic of cybercrime and especially ransomware. However, the increasing presence has a fact-based origin.

Weiterlesen »

Why ransomware attacks are on the rise

Ransomware attacks are ubiquitous. Whether through media coverage, stories from the work environment or acquaintances – there is no getting around the topic of cybercrime and especially ransomware. However, the increasing presence has a fact-based origin.

Weiterlesen »

Two-factor authentication protects – really?!

Two- or multi-factor authentication is the safety belt of cybersecurity. When used correctly, cyber risks can be reduced, but it does not protect against one’s own negligent behavior. We explain how two-factor authentication works, when it is worth using it and where its limits lie.

Weiterlesen »