News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Data classification: effectively sifting through and protecting data treasures

The amount of data in companies is growing exponentially today. The challenge for security teams is to properly protect this data from potential cyber attacks within the available time, budget and human resources. The best way to cope with this task is to properly prioritize the data. Data classification plays a crucial role here, as this technology helps companies to effectively enforce their requirements for risk management, compliance and data security. Basics of data classification Data classification is generally defined as the process of organizing data into relevant categories so that it can be used and protected more efficiently….

Read more

Risk Report: Worries about IT security in the home office
Risk Report: Worries about IT security in the home office

Avast study shows that over half of IT decision-makers in small and medium-sized businesses are more concerned about cybersecurity today than they were before the pandemic. The bigger the company, the more worries about IT security in the home office. A recent survey by Avast, a leading global provider of IT security and data protection solutions, found that security fears among IT decision-makers in small and medium-sized enterprises (SMEs) have increased by 56 percent since the beginning of the pandemic to have. The more employees a company has, the more worries and hardships ...

Read more

KRITIS: Badly protected industrial control systems
KRITIS: Badly protected industrial control systems

Industrial control systems are often inadequately protected against cyber attacks, as security researchers from CloudSEK report. This also applies to companies in the critical infrastructure. A comment from 8com. Countless companies and institutions are under attack by cyber criminals every day - in many cases without them noticing. Attacks from the Internet have increased continuously in recent years and by now every IT manager should know that a stable line of defense against cyber criminals is a duty. Attacks on KRITIS have strong effects The effects a successful attack on companies in the critical infrastructure can have was ...

Read more

Over 300 million ransomware attacks in just 6 months

The new throat year update of the SonicWall Cyber ​​Threat Report 2021 shows that over 2021 million ransomware attacks have already occurred in 300. That is more than in all of 2020. Since the beginning of the year, the numbers have increased particularly in the USA (185%) and Great Britain (144%). In the first half of 2021, the number of ransomware attacks skyrocketed and in just six months is already higher than in 2020 as a whole, as can be read in the half-yearly update for the SonicWall Cyber ​​Threat Report 2021 published today. SonicWall analyzed how cyber criminals ...

Read more

How mutations of ransomware attack backups

Ransomware attacks are becoming increasingly tricky. In addition to classic data encryption, attackers also look specifically for backups. With the right strategy, these attacks will come nowhere. In 2020, the cost of ransomware attacks was more than $ 20 billion - more than twice as much as two years earlier. The average cost of downtime was $ 283.000 - per injured party. While ransomware attacks used to be widely spread and carried out without a defined target, there are now much more precise attacks in which the ransomware attack is sometimes only part of the attack….

Read more

Safely optimize IT with RMM

With remote monitoring and management, IT administration can be massively relieved for small and medium-sized companies - and their infrastructure becomes more stable, more secure and more fail-safe. We answer the most important questions about the topic. The solutions for remote monitoring and management (RMM) are applications that are installed in your company on the servers and other devices such as PCs and mobile devices. In this way, an IT service provider or system house can remotely check their status and maintain the systems. What is the difference to a ...

Read more

Patch Management: 75 percent think it's too time-consuming
Patch Management: 75 percent think it's too time-consuming

A new Ivanti study on patch management shows that almost three quarters of IT security professionals consider patches too complex and time-consuming. However, a lack of time and the unclear prioritization of vulnerabilities and patches expose companies to risks of cyber attacks. Ivanti, the automation platform that discovers, manages, secures and maintains IT assets from the cloud to the edge, today published the results of a study on patching. Accordingly, a majority (71%) of IT and security experts find patching too complex, cumbersome and time-consuming. The corona pandemic is also having an impact on the topic: 57 ...

Read more

Weakness Report 2021: Only progress in cyber security 
Weakness Report 2021: Only progress in cyber security

For years, HiSolutions has published findings on the cybersecurity situation in companies and authorities every year in the vulnerability report. The current report 2021 shows a positive development, which however allows a critical assessment. Cyber ​​security has become one of the top topics on the agenda of companies and authorities around the world in recent years. With the progressive implementation of digitization, the critical consideration of IT security is becoming increasingly important. Legal requirements, competitive pressure and above all economic interests force companies to deal intensively with the question of where their systems are vulnerable ...

Read more

IT security advantages of open source software

Better than its reputation: Why German companies still underestimate the IT security advantages of open source software. Bitkom's Open Source Monitor 2021 provides important answers to security questions. Open source software (OSS) has found its place in the German economy: According to Bitkom's Open Source Monitor 2021, around seven out of ten companies use applications whose basic source code is publicly available. The survey participants value many different advantages, but still view the topic of IT security as critical. The respondents agreed that the lack of specialized OSS specialists is a major disadvantage of open source solutions. The…

Read more

Sophos discovers new Python ransomware

Ultra high-speed attacks on ESXi servers and VMware virtual machines. Sophos researchers discover new Python ransomware. The report entitled “Python Ransomware Script Targets ESXi Server for Encryption” provides a deeper insight. Sophos has released details of a new Python-based ransomware cybercriminals are using to attack and encrypt virtual machines running on ESXi hypervisors. In the report entitled “Python Ransomware Script Targets ESXi Server for Encryption”, the experts at Sophos Labs describe a high-speed attack that took less than three hours from intrusion to encryption. ESXi Platforms Targeted by VMware “This is one of the fastest ransomware attacks…

Read more