cybersecurity

Malware – How Can I Protect My Computer?

Are computers and smartphones adequately protected against malware and data theft? What should you watch out for with antivirus programs?…

1 year ago

The Weakest Link: Humans As An IT Security Risk

Misconduct, inaccurate policies, and misconfigurations of endpoints are common vulnerabilities. The cyber kill chain usually looks for the weakest link…

2 years ago

Home Office Security – That Has Happened

Since the beginning of the Corona crisis, companies have had to rethink: employees have been and are being sent to…

2 years ago

Datacenter – IT Security For Business-Critical Information

The data center is the heart of a company: This is where applications and information find a – ideally safe…

2 years ago

The Four Myths of Vulnerability Management

Vulnerability management helps identify and seal software leaks on endpoints. However, many companies do not use it because they consider…

2 years ago