CEO-Fraud
CEO-Fraud CEO fraud, also known as CEO fraud or “fake president” case, is a popular spear phishing scam. In this case, employees are asked in fake e-mails by their alleged
Wissenswertes rund um die Themen Cybersicherheit, Datenschutz u.v.m.
Hier finden Sie aktuelle Blogbeiträge, Gefahrenwarnungen, ein umfassendes Cyberlexikon sowie praxisnahe Fallstudien und Leitfäden – kompakt aufbereitet, um Sie bei der sicheren Gestaltung Ihrer digitalen Arbeitswelt zu unterstützen.
CEO-Fraud CEO fraud, also known as CEO fraud or “fake president” case, is a popular spear phishing scam. In this case, employees are asked in fake e-mails by their alleged
BYOD – Bring Your Own Device Bring Your Own Device, or BYOD for short, refers to the use of private devices in professional life. Usually, this refers to smartphones, tablets
Federal Office for Information Security (BSI) Is the cybersecurity authority of Germany. The BSI is responsible for the digital information security of the state, business and society. Its tasks include
Brute Force Attack “Brute force” translates as “brute force”. In IT, this brute force corresponds to a less sophisticated approach: indiscriminate trial and error. In a “brute force” attack, an
Bot Derived as a short form from the English word “robot”. “Bot” refers to the IT version of a robot: a computer program that automatically and independently performs certain tasks.
Botnets A bot is a computer program that automatically and independently performs certain tasks. If several bots network with each other, a botnet is created. Although technically neutral, botnets are
Evil Twin An “evil twin” is a fake Wi-Fi network that looks just like a trustworthy, genuine network – for example, the guest Wi-Fi at a company, a café or
Privacy screen (screen cover) A privacy filter (also known as a privacy screen or screen cover) is a physical attachment for laptop, monitor or tablet screens that prevents unauthorised people
Blackbox-Penetrationtest In a penetration test, IT security experts attempt to gain unauthorised access to an IT system – such as a corporate network – in a targeted and authorised manner.
Backup The word ‘backup’ literally means ‘reinforcement’ or ‘safeguard’ and, in IT, refers to a backup copy. For businesses, backup copies of their computers, servers and, above all, their stored