Beiträge aus der Kategorie: Data Security

Cybersecurity Strategy · Data Security · VPN

Segmenting networks for Industrial Control Systems

IT security is increasingly being recognized by most companies as an important aspect of IT security strategy in Industrial Control Systems (ICS). Some measures differ fundamentally from IT security...

Data Security · Endpoint Management

Time for stable and secure VPN

Market researchers are reporting divided opinion on the pros and cons of remote working. While some research reports an overwhelming majority of employees as die-hard remote working fans who never...

Cloud · Cybersecurity Strategy · Data Security

The right way to join the Microsoft cloud

The public cloud is trending and that is a good thing. For many companies, leveraging cloud resources brings benefits – both in terms of IT flexibility and security. For example, Microsoft spends more...

Cybercrime · Cybersecurity Strategy · Data Security

Coronavirus might be here or there but the money comes from ransomware

Although the title of this post is probably not the world’s greatest contribution to rhyming poetry, it remains true. Even though the world is busy dealing with the impact of the coronavirus,...

2 Factor Authentication · Data Security · Endpoint Management

Remote access with privileges: Not all VPN accounts are equal

With surprising efficiency, large parts of the economy in Germany and other countries have switched employees from working in offices to working at home. Teams, Zoom, Jitsi and other tools have taken...

Cloud · Data Security

Azure security – For beginners and advanced users

When people talk about the public cloud, it doesn't take them long to namedrop the major hyperscalers like Amazon AWS and Microsoft Azure. Azure in particular is catching up with Amazon in Germany and...

Cybercrime · Cybersecurity Strategy · Data Security

Phishing on behalf of the coronavirus

That's all we needed: As if the effects of coronavirus on everyday life are not bad enough, cybercriminals are now using the virus as bait in various phishing campaigns. Numerous security companies...

2 Factor Authentication · Data Security · Endpoint Management

The long but right way to two-factor authentication

It is 2020 and accounts which contain valuable and private data can still be created without two-factor authentication. However, it might be some consolation that this is happening less and less. And...

Cloud · Cybersecurity Strategy · Data Security · Internet of Things

Trends for the year ahead

Another year has passed, and we are already looking forward to 12 months of fresh inspiration for companies and users, and new and exciting trends in information security. Last year, various...

Cybersecurity Strategy · Data Security · Encryption · Internet of Things

Smart Cities Need Smart Security

Through the implementation of smart technology, cities around the world are benefiting from increased efficiency, automation, connectivity, smart transportation, and a more sustainable...

Diese Webseite verwendet Cookies

Wir verwenden Cookies, um Inhalte zu personalisieren und die Zugriffe auf unsere Website zu analysieren. Weitere Informationen finden Sie in unserer Datenschutzerklärung.

OK