A comprehensive security test of individual computers or networks protects companies from hacker attacks. Almost every fifth IT manager has…
No security and foresight measure is superfluous against Internet scams. On a daily basis, the dynamics of your company when…
What Is Multi-Factor Authentication? Multi-factor authentication (MFA) is an authentication method that combines multiple credentials - the factors. You know…
Many companies know it: In theory, there is a clear rule on how the requirements of the GDPR should be…
Not only are companies navigating better and better in the digital world, but also criminals. This year alone, we were…
After looking at phishing and hacking in our Internet Identity Theft series, let's take a closer look at malware today.…
In our series on identity theft on the Internet, we are now devoting ourselves to social engineering: the attack method…
Artificial intelligence - in short: AI - has made it from fiction into everyday life: Science benefits from artificial intelligence…
For around three years now, a noticeable paradigm shift has been observed in software development: Instead of the waterfall model,…
The reason for this is the explosion in cyber threats. More and more IT departments rely on penetration tests or…