Data

Physical Protection – Protect Your Data and Information!

  To ensure successful and sustainable digitization in companies and public authorities, it is not only essential to secure technical and organizational measures relating to IT systems and processes, but also to adequately secure buildings and premises. The BSI’s Management Report 2021 shows that “information security is the prerequisite for successful and sustainable digitization.” BSI …

Physical Protection – Protect Your Data and Information! Read More »

Privacy and data protection on the Internet: Eyes on the VPN choices

Virtual Private Networks – VPNs for short – have experienced a boost with the Corona crisis: Ideally, home office employees should have encrypted and secure access to the corporate network. However, this only works if the VPN provider is trustworthy. VPN connections have great advantages: they disguise data traffic on the Internet and protect against …

Privacy and data protection on the Internet: Eyes on the VPN choices Read More »

Database Security: Costs, Benefits and Risks of Database Backups

In the modern workplace, data is the lifeblood for businesses and protecting it is correspondingly important. And database backups are one of the common methods database administrators (DBAs) use to ensure the continued availability of data: This involves copying data and schemas from a database and storing them in another location from which they can …

Database Security: Costs, Benefits and Risks of Database Backups Read More »

NRW Data Protection Report: Rebuke for Security Authorities

In her annual report, the new chief data protection officer of the state of North Rhine-Westphalia (NRW) takes on the police and public prosecutors, criticizing data protection breaches. In her new annual report, NRW data protection commissioner Bettina Gayk criticizes police and public prosecutors. For example, in its investigations into suspected right-wing extremist networks within …

NRW Data Protection Report: Rebuke for Security Authorities Read More »

How Does the Security Infrastructure of A Smart City Work?

How Does the Security Infrastructure of A Smart City Work

The smart city is a digital image of the city in all its facets and arises from the desire to create added value for residents and visitors through the close-meshed networking of public services and commercial applications. A special feature in the smart city is the public accessibility of IT systems and users since, unlike …

How Does the Security Infrastructure of A Smart City Work? Read More »

Device Encryption in Windows 10 and 11: How To Do It with All Editions

Device Encryption in Windows 10 and 11 How To Do It with All Editions

Device encryption in Windows 11 can be used as a replacement for Bitlocker and protect Windows notebooks and PCs from data theft for free but effectively. The article shows how to set up this technology. With device encryption in Windows 10/11, PCs and notebooks on which Windows 10/11 Home is installed can also use data …

Device Encryption in Windows 10 and 11: How To Do It with All Editions Read More »

Challenges of A 20-Year-Old Technology: AD Security Put to The Test

Most organizations today rely on Microsoft Active Directory (AD) to keep their business running. AD is easy to use, has been around for many years and is very reliable. But the service is coming under increasing scrutiny – from a security perspective. Active Directory (AD) performed its service unnoticed for a long time. AD is …

Challenges of A 20-Year-Old Technology: AD Security Put to The Test Read More »

Cracks in The Ransomware Ecosystem

According to the UK’s National Cyber Security Centre (NCSC), ransomware is the most immediate threat to businesses worldwide. Cybercrime around ransomware is organized and sophisticated, with technology that has been democratized and made accessible to the point that ransomware has become its own economy. Some ransomware operators are playing a numbers game by targeting MSPs …

Cracks in The Ransomware Ecosystem Read More »

Mobile Device Management With Microsoft 365

Mobile Device Management With Microsoft 365

Companies that rely on Microsoft 365 also receive basic mobile device management functions. These can be used for Android devices and also for iOS/iPadOS. In many cases, however, companies here rely on Microsoft Endpoint Manager/Intune features. Basic Mobility and Security enables the basic management of smartphones and tablets as part of the connection to Microsoft …

Mobile Device Management With Microsoft 365 Read More »

Four questions every CISO should be asking about the Metaverse today: The safety of the Metaverse starts now!

Four questions every CISO should be asking about the Metaverse today The safety of the Metaverse starts now!

The metaverse is coming – and sooner than you think. Gartner predicts that by 2026, a quarter of people will spend at least an hour a day in the Metaverse. For enterprises, it will likely add value with new business models and ways of working that we can only dream of today, but for cybersecurity, …

Four questions every CISO should be asking about the Metaverse today: The safety of the Metaverse starts now! Read More »

The Biggest Data Protection Mistakes in Email Marketing

Email marketing has not lost its relevance even in times of the General Data Protection Regulation. But the GDPR places high demands on advertising sent via mail. The data protection supervisory authorities report on typical mistakes that continue to happen to companies and that have come to the attention of the relevant supervisory authority as …

The Biggest Data Protection Mistakes in Email Marketing Read More »

Data Protection in Europe: Victory for Consumer Advocates, Wake-Up Call for Companies

Data Protection in Europe Victory for Consumer Advocates, Wake-Up Call for Companies

The European Court of Justice (ECJ) has strengthened consumer protection associations as watchdogs in data protection breaches. The Federation of German Consumer Organizations (vzbv) got the green light from Luxembourg to take action against Facebook parent company Meta in the event of data protection violations. They do not have to be instructed to do so …

Data Protection in Europe: Victory for Consumer Advocates, Wake-Up Call for Companies Read More »