CYBER SECURITY

Penetration Testing – Beating The Hackers At Their Own Game

A comprehensive security test of individual computers or networks protects companies from hacker attacks. Almost every fifth IT manager has…

2 years ago

Internet Scams And How To Prevent Them

No security and foresight measure is superfluous against Internet scams. On a daily basis, the dynamics of your company when…

3 years ago

Authenticate, Authenticate & Authorize: Multi-Factor Authentication

What Is Multi-Factor Authentication? Multi-factor authentication (MFA) is an authentication method that combines multiple credentials - the factors. You know…

3 years ago

Human Weakness: Make Employees Aware Of Data Protection

Many companies know it: In theory, there is a clear rule on how the requirements of the GDPR should be…

3 years ago

Online Training In IT Security: New Awareness Offer For SMEs

Not only are companies navigating better and better in the digital world, but also criminals. This year alone, we were…

3 years ago

Internet Identity Theft: What Is Malware?

After looking at phishing and hacking in our Internet Identity Theft series, let's take a closer look at malware today.…

3 years ago

Identity Theft On The Internet: What Is Social Engineering?

In our series on identity theft on the Internet, we are now devoting ourselves to social engineering: the attack method…

3 years ago

Artificial Intelligence & cybersecurity: A Curse And A Blessing At The Same Time

Artificial intelligence - in short: AI - has made it from fiction into everyday life: Science benefits from artificial intelligence…

3 years ago

Agile Security: Five Tips For Security Managers

For around three years now, a noticeable paradigm shift has been observed in software development: Instead of the waterfall model,…

3 years ago

Simulated Cyber ​​Attacks: Exercises To Protect Against Cyber ​​Risks?

The reason for this is the explosion in cyber threats. More and more IT departments rely on penetration tests or…

3 years ago