News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

DORA: How financial companies are meeting the challenges
DORA: How financial companies are meeting the challenges

The Digital Operational Resilience Act (DORA) was passed to address the increasing cyber threats in the financial industry and strengthen resilience. Implementation is challenging for many companies. An expert explains how organizations can address this. Since January 17.01.2025, XNUMX, companies in the European financial sector have been required to comply with the DORA requirements. DORA mandates robust IT risk management and incident reporting processes, which poses challenges for many financial institutions. This is because numerous companies in the financial sector still use outdated IT systems that are unable to meet DORA's stringent requirements.

Read more

Ransomware: Almost one in three companies affected by 2024
Ransomware: Almost one in three companies affected by 2024 Image: Bing - AI

New ransomware survey: The number of ransomware victims paying ransoms has more than doubled in the past year. Two-thirds of companies say that generative AI technology has increased their fear of ransomware attacks. Almost one in three companies has lost data. In 2024, 16,3% of ransomware victims paid ransoms. This more than doubles the figure compared to the previous year (6,9%). This is shown by the new ransomware study by leading cybersecurity expert Hornetsecurity. Data loss is also expected to increase drastically in 2024, at 30,2% compared to...

Read more

Cloud Data Protection Strategies for Healthcare Providers
Cloud Data Protection Strategies for Healthcare Providers

Digitalization in healthcare is increasing steadily. The risk of cyberattacks is increasing at the same rate. Protecting sensitive data in the cloud and a functioning disaster recovery strategy are of utmost importance, especially for healthcare providers. Data in healthcare is one of the most critical assets. It includes highly sensitive information such as medical histories, treatment records and personal data. Protecting this data is of utmost importance because it is classified as special categories of personal data by national and global regulations. The consequences of incorrect handling of data or inadequate data security in the...

Read more

Cloud vs. in-house server: what is the best choice?
Cloud vs. in-house server: What is the best choice? Image: Bing - AI

According to Statista, IT experts worldwide estimate a nearly 2024/50 split between onsite and cloud-hosted servers in their companies by 50. Due to the huge amounts of data and the increasing use of AI, more and more servers will be needed in the future. At the same time, however, the market for public cloud services is also growing, so companies have to ask themselves where they should invest their IT budget in order to get the best return on their server investments. Cloud servers offer numerous advantages, including scalability and flexibility through on-demand resources, cost efficiency thanks to the pay-as-you-go model and high availability, often over 99,9 percent. Maintenance...

Read more

Ransomware attacks: The long road to suffering
GoldenJackal: Hackers attack computers isolated from the Internet

Ransomware attacks have devastating consequences for companies. They only last a short time, but recovery can take months. This leads to significant financial damage. This makes it all the more important to protect against them. When it comes to the duration of a ransomware attack and the subsequent recovery process, the numbers are frightening and vary widely, says Dr. Martin J. Krämer, Security Awareness Advocate at KnowBe4. This is partly because there is no single source that summarizes all the information in a uniform way. Recovery from an attack takes months On average, a cyber attack can…

Read more

Countering complex attacks with cyber recovery
Countering complex attacks with cyber recovery

Cyber ​​recovery goes far beyond operational recovery and disaster recovery. It allows systems, applications and data to be restored even after a complex cyber attack. Nowadays, most cyber attacks begin without the use of malware, but with the help of compromised access data. As a result, despite numerous security measures, cyber criminals can easily gain access to systems in order to then, for example, spread ransomware, encrypt data, exfiltrate sensitive data or even block IT assets. Cyber ​​resilience with reliable and sustainable recovery options after an attack is crucial in order to quickly recover from its effects...

Read more

State data center saves on backups – total data loss
B2B Cyber ​​Security ShortNews

On June 20th, there was a large-scale disruption of digital services in Indonesia: It emerged that a state data center had been attacked and partially encrypted using ransomware. There were no backups because they were cut back for cost reasons. After a ransomware attack on the Temporary National Data Center (PDNS) in Indonesia, it emerged that the national data center had no backup plan. Now even Indonesia's President Widodo has ordered an audit of state data centers. After all, there are no backup copies for most of the stored data. Cut back: No backups after ransomware attack On June 20th, there were...

Read more

Financial sector pays record sums in ransomware attacks

The number of annual ransomware attacks on companies in the financial sector is constantly growing: while it was 2021 percent in 34, the number rose to 2022 percent in 55 and is 2023 percent in the 64 report. There is no end in sight, according to the study “The State of Ransomware 2023”. Unauthorized entry into the systems usually occurs through exploited vulnerabilities (40 percent). Compromised credentials, on the other hand, are only responsible for 23 percent of attacks - one of the lowest rates in the financial sector. Here, educational work among the workforce could ensure greater safety awareness...

Read more

Cyber ​​attacks: Inadequate security in German companies
Cyber ​​attacks: Inadequate security in German companies

Although simple steps can increase security, only 64,5 percent of German companies implement password guidelines, 58,0 percent create backups and 54,0 percent use multi-factor authentication. According to the TÜV association, decision-makers in every ninth financial organization had to complain about a security incident last year; Furthermore, according to Bitkom, damage totaling around 203 billion euros was caused by cyber attacks on German companies. Decision-makers should therefore be clear that a preventive and sustainable cybersecurity strategy is a "must" for sustainable cyber protection. However, the status quo of security measures at some companies in Germany is sobering,...

Read more

Backups - safe, data protection compliant and redundant
Backups - secure, data protection compliant and cost-effective

The data backup solution integrated into the Microsoft Windows operating system works on the basis of the highly secure eperi gateway and encrypts all OneDrive backups and stores them in the cloud. With this new solution from eperi, companies have the opportunity to use the OneDrive (for Business) cloud storage available in Microsoft 365 as a backup target and at the same time to meet all data security and compliance requirements. The automated backups of all devices in the company are ensured on the basis of OneDrive, so that in the event of data loss, a restore can be carried out inexpensively, quickly and easily. Location-independent data backup...

Read more