Wissenswertes rund um die Themen Cybersicherheit, Datenschutz u.v.m.

Medien & Inhalte

Hier finden Sie aktuelle Blogbeiträge, Gefahrenwarnungen, ein umfassendes Cyberlexikon sowie praxisnahe Fallstudien und Leitfäden – kompakt aufbereitet, um Sie bei der sicheren Gestaltung Ihrer digitalen Arbeitswelt zu unterstützen.

Doxing

Doxing The term doxing is derived from the English word “documents” (short “docs”) for documents. Doxing (also doxxing) is the targeted collection of information about people with the help of

Weiterlesen »

Double Extortion Ransomware

Double Extortion Ransomware Double extortion translates to “double extortion”. This does not necessarily involve multiple blackmail, but the cybercriminals use several means of pressure for their blackmail. With the ransomware

Weiterlesen »

DOS and DDOS attack

DOS and DDOS attack DOS stands for Denial of Service. This literally translates to “denial of service.” More appropriate would be “unavailability of the service”. This is because a DOS

Weiterlesen »

Data security

Data security Data security is given when the confidentiality, integrity and availability of data is ensured. The term is also used synonymously with “information security”. What does the term data

Weiterlesen »

Cyber incident

Cyber incident A cyber incident is any event that affects your stored information or your IT resources and could cause significant damage to your business. The range of cyber incidents

Weiterlesen »

Cybersecurity

Cybersecurity Protection of information technology devices (e.g. computers or smartphones) and systems from the dangers of decommissioning, manipulation or the outflow of data through cyberspace. What does the term cybersecurity

Weiterlesen »

Cyber risk

Cyber risk Cyber risk is the possibility that something could happen to the information or IT components stored in your company that would cause significant damage to your company. Risk

Weiterlesen »

Cybercrime

Cybercrime Refers to crimes committed by or against information technology. In most cases, the Internet is used for this purpose. What does that mean in detail? The field of cybercrime

Weiterlesen »

Cryptojacking

Cryptojacking Composed of two abbreviated English terms: The component “crypto” is derived from the term “cryptocurrencies” (in German: cryptocurrencies). It refers to virtual currencies such as Bitcoin. The word “jacking”

Weiterlesen »

Credential Stuffing

Credential Stuffing Credential stuffing is the automated use of revealed username and password combinations to illegally gain access to user accounts and, if necessary, take them over completely. What does

Weiterlesen »