Kategorie: Security

Botnet detection: prevention to protect data

When computers suddenly work for others Imagine an inconspicuous company computer suddenly working for someone else without anyone noticing. This is exactly what happens when a botnet becomes active. As part of cyber security, botnet detection ensures that threats are detected at an early stage. This allows you to prevent attacks on your company’s data. […]

Artikel lesen
Patch management: always secure thanks to software updates

Sophisticated patch management ensures that the software in your company is always up to date. Regular updates close security gaps and protect sensitive data from cyber attacks. What is patch management? Patch management is the strategic monitoring, control and installation of software updates. The aim is to close security gaps, keep the software stable and […]

Artikel lesen
Zero Trust Prinzipien
Zero Trust principles: The security standard in companies

The Zero Trust principles are now the most important security model in many companies worldwide. They are based on the guiding principle: “Never trust, always verify.” This means that no access is granted simply on the basis of trust, but is always checked first. Zero Trust: 5 principles for your corporate security Zero Trust is […]

Artikel lesen
Identity theft with AI: procedure and protection

Identity theft with AI is one of the negative developments that this relatively new technology has brought about. Artificial intelligence opens up new opportunities for cyber criminals. But you can protect yourself against it if you know what you’re up against. What is identity theft with the help of artificial intelligence? Identity theft is a […]

Artikel lesen
Micro-segmentation: Secure network access through targeted measures

Microsegmentation is a method of making networks more secure. This involves dividing a network into different segments, each of which has its own security measures. What is microsegmentation? Microsegmentation aims to prevent data from moving sideways within a network. This means that data moves between different areas in the network. This entails the risk that […]

Artikel lesen
Secure access to DATEV Employees Online with TOTP-Authenticator

In times of digital personnel administration, security and data protection are becoming increasingly important – especially when dealing with sensitive documents such as pay slips, social security certificates or income tax certificates. The DATEV Employees Online platform offers employers and employees a central, paperless solution for accessing such documents. DATEV relies on modern two-factor authentication […]

Artikel lesen
Social hacking: Attacks that use people as a weak point

Cyber criminals use social hacking to gain access to areas that are well protected by technologies such as firewalls. To do this, they take the human route. This article explains how this works and how you can protect your company against it. What is social hacking? The method originates from so-called social engineering. Hackers try […]

Artikel lesen
Hardware token: The secure way of authentication

With a hardware token (or security token), you ensure that hackers and cyber criminals cannot gain access to your accounts and data. It is the most reliable security measure you can currently take. What is a hardware token? There are several names for the hardware token. Among other things, it is also known as a […]

Artikel lesen
5 IT security tips for companies

With 5 tips on IT security for companies, you can protect your data from attacks. Even if you think that your company cannot be a target for hackers, you should protect your company, because every company is a target for hackers. Tip 1: Make IT security a top priority Many companies believe that IT security […]

Artikel lesen
The product has been added to the shopping cart Show shopping cart