Computer

Why MFA is not just MFA?

Why MFA is not just MFA

Multi-factor authentication (MFA) was developed to prevent or make it more difficult for accounts to be compromised. And although many companies now use multiple authentication mechanisms, especially for sensitive accounts, cybercriminals still manage to gain access to their victims’ accounts quite frequently. Multi-factor authentication has a problem: If only one of the authentication methods used …

Why MFA is not just MFA? Read More »

94 Percent Increase in Attacks on Health Care

Ransomware attacks on healthcare organizations are noticeably on the rise. However, paying the ransom is no guarantee of getting encrypted data back. Hacking attacks on the healthcare industry pose a real threat. This is now confirmed once again by Sophos’ industry analysis, “The State of Ransomware in Healthcare 2022.” According to the report, there has …

94 Percent Increase in Attacks on Health Care Read More »

Unmistakable Clues to An APT Attack

Unmistakable Clues to An APT Attack-

APT hackers avoid verifiable events, error messages, or service interruptions and target data theft or system monitoring over an extended period of time. After that, they usually disappear again unnoticed. Is it possible to detect something that should remain silent and unnoticed? APT hackers and malware are more widespread and sophisticated than ever. For some …

Unmistakable Clues to An APT Attack Read More »

Activate and set up Windows Hello for Business

With Windows Hello and Windows Hello for Business, Microsoft also offers services for Windows and the cloud that allow logging in without passwords. They are based on authentication apps and biometric devices, for example notebooks. With Windows Hello, Microsoft has long supported the possibility of authenticating oneself on notebooks or computers with special webcams, PINs …

Activate and set up Windows Hello for Business Read More »

How Does the Security Infrastructure of A Smart City Work?

How Does the Security Infrastructure of A Smart City Work

The smart city is a digital image of the city in all its facets and arises from the desire to create added value for residents and visitors through the close-meshed networking of public services and commercial applications. A special feature in the smart city is the public accessibility of IT systems and users since, unlike …

How Does the Security Infrastructure of A Smart City Work? Read More »

Device Encryption in Windows 10 and 11: How To Do It with All Editions

Device Encryption in Windows 10 and 11 How To Do It with All Editions

Device encryption in Windows 11 can be used as a replacement for Bitlocker and protect Windows notebooks and PCs from data theft for free but effectively. The article shows how to set up this technology. With device encryption in Windows 10/11, PCs and notebooks on which Windows 10/11 Home is installed can also use data …

Device Encryption in Windows 10 and 11: How To Do It with All Editions Read More »

Mobile Device Management With Microsoft 365

Mobile Device Management With Microsoft 365

Companies that rely on Microsoft 365 also receive basic mobile device management functions. These can be used for Android devices and also for iOS/iPadOS. In many cases, however, companies here rely on Microsoft Endpoint Manager/Intune features. Basic Mobility and Security enables the basic management of smartphones and tablets as part of the connection to Microsoft …

Mobile Device Management With Microsoft 365 Read More »

Phishing Has Become Professionalized and Is Part of Everyday Corporate Life

Phishing Has Become Professionalized and Is Part of Everyday Corporate Life

The steep rise in phishing attacks in recent months was reason enough for Sophos to take a closer look at this form of cybercrime. The result: Sophisticated tactics combined with penetrating behavior make up the new quality of phishing emails. Attackers have discovered the benefits of malware-as-a-service (MaaS) – a cousin of ransomware-as-a-service (RaaS), both …

Phishing Has Become Professionalized and Is Part of Everyday Corporate Life Read More »

Effective Safeguards Against Account Takeover

The use of digital online services shapes our everyday lives. The spectrum ranges from e-mail, social networks, and online stores to utilities, insurers, health insurance companies, and professional services. Access data is correspondingly attractive to criminal attackers, who use it to take over existing user accounts (account takeover). Attackers are constantly developing new ideas for …

Effective Safeguards Against Account Takeover Read More »

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

How to Defend Against Cybercrime Groups with Million-Dollar Budgets?

The question from the headline is probably asked by every IT today. There are simple answers: “not at all”, “de-network / reduce dependency on IT” and “buy new tools”. Unfortunately, the same is true here as with many other complex issues: There is no quick easy solution (“silver bullet”). But there is a proven, three-step …

How to Defend Against Cybercrime Groups with Million-Dollar Budgets? Read More »

What Is Home Office?

What Is Home Office?

Homeoffice is a form of telework that can be performed as telecommuting or alternating telecommuting. The work is performed completely or partially from private premises. Contact with the company, colleagues, or customers takes place via telephone, e-mail, and other Internet services. The IT and communications equipment required is a telephone, PC or laptop, and an …

What Is Home Office? Read More »

Keeping Windows Firewall Under Control with Freeware

Keeping Windows Firewall Under Control with Freeware

With freeware tools such as GlassWire, Windows 10 Firewall Control, and Firewall App Blocker, users and administrators can additionally secure computers with Windows 10/11 better than is possible with the onboard means. In this article, we will show tools that are also interesting for professionals. Keeping Windows firewall under control with freeware Tools like GlassWire, …

Keeping Windows Firewall Under Control with Freeware Read More »