
Myth or truth: Alexa is always listening!
Voice assistants such as Alexa are there for us on demand. But many users are wondering: Is the voice assistant actually always listening in? And if so, what does that mean?
Wissenswertes rund um die Themen Cybersicherheit, Datenschutz u.v.m.
Hier finden Sie aktuelle Blogbeiträge, Gefahrenwarnungen, ein umfassendes Cyberlexikon sowie praxisnahe Fallstudien und Leitfäden – kompakt aufbereitet, um Sie bei der sicheren Gestaltung Ihrer digitalen Arbeitswelt zu unterstützen.

Voice assistants such as Alexa are there for us on demand. But many users are wondering: Is the voice assistant actually always listening in? And if so, what does that mean?

Russia’s war of aggression on Ukraine has already lasted three weeks, and for the first time this war is taking place both territorially and throughout cyberspace. In the meantime, German companies are also feeling the conflict first-hand in the form of cyber threats. We have compiled the most relevant events and news for you at a glance.

In recent days, the question of what impact the war in Ukraine could have on cybersecurity has come up more and more frequently. We asked our CISO Monika Bubela for a classification.

Security in the digital world has many facets. It ranges from technical requirements to recognizing misinformation or fake news. From protecting your privacy to protecting company secrets and protecting against malware. We at Perseus strive to always prepare the various information on the subject in a way that is easy to understand and accessible.

In many companies, “data protection supervisory authority” is almost a fear term. Likewise, there is often confusion about who the “competent data protection authority” is and what exactly it does. We want to change that with this blog post.

2021 has been a turbulent year – also when it comes to cybersecurity. What can we learn from the events for 2022? We reveal that in this blog article.

Responsible disclosure – this is the principle that ethical hackers follow when they discover a security vulnerability in a company. We explain what Responsible Disclosure is in this blog post. We also explain why companies should collect and use this information in a targeted manner – and give initial tips on how.

Ransom demands after a successful ransomware attack are a sensitive topic. The sum demanded can be very high. Just like the pressure to pay them. But there is no guarantee that you will get your data back. You may even be liable to prosecution by paying. In addition, every payment makes the ransomware business model even more profitable and thus worsens the overall situation. But without data and usable IT, everything in your company has been at a standstill for days and the costs …!

Ransomware is a serious risk for companies. Currently, however, there is more and more talk of Double Extortion ransomware. What is it, what do these attacks mean for companies and how can you protect yourself? We’ll tell you in this blog post.

85% of all German companies use Microsoft Office as their office software of choice. Many documents are also created, edited and shared privately with Word & Co. But cybercriminals also like to use Office programs – to spread malware. We’ll tell you how you can better protect yourself against it.