Beiträge aus der Kategorie: Cybersecurity Strategy

Cybersecurity Strategy · Data Security · VPN

Segmenting networks for Industrial Control Systems

IT security is increasingly being recognized by most companies as an important aspect of IT security strategy in Industrial Control Systems (ICS). Some measures differ fundamentally from IT security...

Cloud · Cybersecurity Strategy · Data Security

The right way to join the Microsoft cloud

The public cloud is trending and that is a good thing. For many companies, leveraging cloud resources brings benefits – both in terms of IT flexibility and security. For example, Microsoft spends more...

Cybercrime · Cybersecurity Strategy · Data Security

Coronavirus might be here or there but the money comes from ransomware

Although the title of this post is probably not the world’s greatest contribution to rhyming poetry, it remains true. Even though the world is busy dealing with the impact of the coronavirus,...

Cybercrime · Cybersecurity Strategy · Data Security

Phishing on behalf of the coronavirus

That's all we needed: As if the effects of coronavirus on everyday life are not bad enough, cybercriminals are now using the virus as bait in various phishing campaigns. Numerous security companies...

Cybersecurity Strategy

Working (or not) in times of COVID-19

Previously, permission to work from the home office was a high measure of trust and representative of new work attitude, today it has become a preventative measure just like regular hand washing....

Cloud · Cybersecurity Strategy · Data Security · Internet of Things

Trends for the year ahead

Another year has passed, and we are already looking forward to 12 months of fresh inspiration for companies and users, and new and exciting trends in information security. Last year, various...

Cybersecurity Strategy · Data Security · Encryption · Internet of Things

Smart Cities Need Smart Security

Through the implementation of smart technology, cities around the world are benefiting from increased efficiency, automation, connectivity, smart transportation, and a more sustainable...

Cybercrime · Cybersecurity Strategy · Data Security

Office 365 - The enemy in my inbox

Just as things don’t always go to plan in practice this is also true of information security. Although the security world are discussing defense strategies involving microsegmentation and artificial...

Cybercrime · Cybersecurity Strategy · Data Security · Encryption · HIPAA

Best Practices for Securing Healthcare Data

The escalation of ransomware and trojan malware combined with the lack of endpoint security caused the healthcare sector to suffer from massive data breaches in 2019. As healthcare organizations rely...

Cybercrime · Cybersecurity Strategy · Data Security · Encryption · Endpoint Management

The Worst Data Breaches of 2019

Another day, another data breach. With more than five thousand data breaches and over seven billion records exposed, 2019 was the worst year on record for breach activity. According to research from...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK