News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Advantages of cloud services vs. on-premises

More security in the cloud: four advantages of cloud services compared to on-premises. Increased remote work has greatly accelerated corporate cloud adoption. For many organizations, home office has now become part of the corporate culture. However, this shift towards New Work requires a shift to new policies and security tools that are appropriate for the modern remote workplace. Endpoint protection services, if they are not already, must be migrated to cloud services to ensure data protection across the company. Because of this shift, security officers should also follow the guidelines for data security, disaster ...

Read more

Attacks on IIoT in the German healthcare system
Attacks on IIoT in the German healthcare system

Kaspersky study: Attacks on IIoT platforms in the German healthcare system increased. 21,3 percent of German companies experienced an increase in cyber attacks on their IIoT platforms during the Covid 19 pandemic. Only 30,7 percent believe that their IIoT is adequately secured. The health industry has been increasingly threatened by digital attacks since the corona pandemic. In the health sector, IIoT platforms and thus devices such as magnetic resonance imaging (MRT) and computed tomography (CT) are also affected. Portable medical devices for remote monitoring of patients, such as measuring devices for blood sugar or blood pressure, are also vulnerable, provided they are connected to the office infrastructure. More than the half…

Read more

DDoS Attack Report Q2 2021 from Radware
DDoS Attack Report Q2 2021 from Radware

The volume of DDoS attacks (Distributed Denial of Service) increased by 40 percent worldwide in the second quarter compared to the same period last year. This is one of the key findings of Radware's quarterly DDoS Attack Report. The report provides an overview of DDoS attack trends by industry as well as by application and attack type. Geographically, the attacks were mainly spread across America and the EMEA region, which accounted for 80 percent of the volume. In terms of industries, the focus was primarily on technology companies with an average of almost 3.000 attacks, followed by healthcare with around 2.000 attacks per ...

Read more

Contract hacker: hunter of data treasure
Contract hacker: hunter of data treasure

Cybercriminals focus on companies: As digitization progresses, the volume of data in the economy will multiply in the future. These are particularly tempting targets for hackers or blackmailers. The legislation has therefore ensured that data protection also enjoys a high priority in digital data processing. In addition to protecting trade secrets, companies must give high priority to the security of personal data. Violations of the GDPR can have particularly serious consequences: If there is a loss of data, those affected must be informed. In addition, such a security incident can be reported by the supervisory authorities with a ...

Read more

Overtired IT teams lose the battle against phishing
Overtired IT teams lose the battle against phishing

New Ivanti study: Overtired IT teams and poorly prepared employees are losing the battle against phishing. Almost three quarters of businesses were phishing attacks last year. One reason: More than half suffered from a shortage of IT specialists. Ivanti, the automation platform that detects, manages, secures and maintains IT resources from the cloud to the edge, has presented the results of a recent survey on phishing attacks. The central message of the study: The global shift of work to remote locations has significantly increased the number of attacks, their sophistication and the effects of phishing attacks….

Read more

Prevent data leaks in the Industrial IoT

Protection of valuable IIoT data in the industrial sector. In manufacturing, the Industrial Internet of Things (IIoT) is becoming more and more embedded in ecosystems thanks to advances in automation, big data analytics and lower hardware costs. In the Internet of Things (IoT), networked smart home appliances and personal assistants such as Alexa or Siri are often mentioned, but the IoT already extends far beyond the use of consumer devices. More and more companies are using IoT technologies to facilitate automation and increase their productivity. Automobile manufacturers, rail-bound transport systems and companies from the food ...

Read more

Cloud environments: new priorities for data protection
Cloud environments: new priorities for data protection

As a result of the pandemic regulations, home office operations seem to be establishing themselves as a permanent organizational pillar in companies. According to the current Remote Work Report from Bitglass, for which 287 IT security managers were surveyed in January 2021, 53 percent of companies plan to permanently move certain job positions to the home office. Apparently, this gives the introduction of cloud technologies a further boost, because a clear majority relies on cloud-based IT ecosystems for home office operations: 71 percent of those surveyed state that their company is switching from on-premises applications and tools to the cloud will. There is above all ...

Read more

The enemy in your own inbox
The enemy in your own inbox

Attacking email accounts will continue to be one of the most popular methods used by cyber criminals to gain access to sensitive company information. Barracuda best practices for addressing a lack of integration between incident response and web security. Although classics such as compromised email attachments or links still serve their purpose, attackers do not necessarily want to rely on them: social engineering or the use of stolen credentials for planned data theft are far more difficult tactics. And so, inefficient responses to email attacks cost companies billions of dollars each year. Because for many companies, finding, identifying and removing email threats is a ...

Read more

Expandable: IT security level in the German healthcare system
Expandable: IT security level in the German healthcare system

Kaspersky study reveals IT security level in the German healthcare system: every third IT decision-maker sees employees as the greatest IT security risk, almost 75 percent of those surveyed experienced attacks during the pandemic and one in four worries about the loss of confidential patient and company data. The Federal Ministry of Health is relying on the increasing digitalization of the health system. But how secure is the industry's IT infrastructure in Germany? As part of a new study, Kaspersky asked IT decision-makers from the healthcare ecosystem about the IT security situation in Germany, Austria and Switzerland. The study participants from the Federal Republic therefore see their own employees as the greatest ...

Read more

Problem area: weak point access data

Credentials vulnerability: Identity and access management best practices. When it comes to passwords, their online presence offers companies a broad digital attack surface that cyberattackers can break through in various ways. If they succeed in stealing valid access data from an account, they can use the hijacked identity to steal valuable data or cause further damage in corporate environments. In a working world that is increasingly characterized by remote work, the security and credibility of digital identities are gaining new relevance. Similar to physical forms of identification, digital forms of identification must also be reliably protected against misuse, theft and fraud. The digital ...

Read more