• The Secret to Effective Remote Access VPN Management

    2 Factor Authentication · Data Security · Endpoint Management

    Remote access with privileges: Not all VPN accounts are equal

    With surprising efficiency, large parts of the economy in Germany and other countries have switched employees from working in offices to working at home. Teams, Zoom, Jitsi and other tools have taken...

    Cloud · Data Security

    Azure security – For beginners and advanced users

    When people talk about the public cloud, it doesn't take them long to namedrop the major hyperscalers like Amazon AWS and Microsoft Azure. Azure in particular is catching up with Amazon in Germany and...

    Cybercrime · Cybersecurity Strategy · Data Security

    Phishing on behalf of the coronavirus

    That's all we needed: As if the effects of coronavirus on everyday life are not bad enough, cybercriminals are now using the virus as bait in various phishing campaigns. Numerous security companies...

    Cybersecurity Strategy

    Working (or not) in times of COVID-19

    Previously, permission to work from the home office was a high measure of trust and representative of new work attitude, today it has become a preventative measure just like regular hand washing....

    2 Factor Authentication · Data Security · Endpoint Management

    The long but right way to two-factor authentication

    It is 2020 and accounts which contain valuable and private data can still be created without two-factor authentication. However, it might be some consolation that this is happening less and less. And...

    Cloud · Cybersecurity Strategy · Data Security · Internet of Things

    Trends for the year ahead

    Another year has passed, and we are already looking forward to 12 months of fresh inspiration for companies and users, and new and exciting trends in information security. Last year, various...

    Cybersecurity Strategy · Data Security · Encryption · Internet of Things

    Smart Cities Need Smart Security

    Through the implementation of smart technology, cities around the world are benefiting from increased efficiency, automation, connectivity, smart transportation, and a more sustainable...

    Cybercrime · Cybersecurity Strategy · Data Security

    Office 365 - The enemy in my inbox

    Just as things don’t always go to plan in practice this is also true of information security. Although the security world are discussing defense strategies involving microsegmentation and artificial...

    Cybercrime · Cybersecurity Strategy · Data Security · Encryption · HIPAA

    Best Practices for Securing Healthcare Data

    The escalation of ransomware and trojan malware combined with the lack of endpoint security caused the healthcare sector to suffer from massive data breaches in 2019. As healthcare organizations rely...

    Cybercrime · Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

    The Worst Data Breaches of 2019

    Another day, another data breach. With more than five thousand data breaches and over seven billion records exposed, 2019 was the worst year on record for breach activity. According to research from...

    This website uses cookies

    We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.