News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Protect data from Double Extortion Ransomware
Protect data from Double Extortion Ransomware

Double-extortion attacks are increasing: The attack not only encrypts the data and extorts a ransom, but also steals data that will be published if payment is not made. These attacks pose challenges for companies and pose major financial risks. More than half (57 percent) of the companies surveyed in Germany paid a ransom for encrypted data after a ransomware attack, according to figures from the latest Zero Labs Report. Only 24 percent of them were able to recover all data using the attackers' decryption tools after payment. Even more annoying: collecting a ransom once is enough for…

Read more

IT administration: too little data security in medium-sized companies
IT administration: too little data security in medium-sized companies

In many medium-sized companies, not only the IT administrator has unrestricted access to all operational data, but also the IT-savvy trainee. If he later leaves the company, he often retains his access rights because nobody thinks about it, explains data security specialist Detlef Schmuck. The granular IT authorization systems that are common in large companies are often saved in medium-sized companies for cost reasons. In essence, each user is only granted those access rights to databases that are absolutely necessary for the respective workplace. "However, the management of individual access authorizations requires a lot of effort, especially since there is always a tendency on the user side to have more...

Read more

Cyber ​​attacks on healthcare organizations
Cyber ​​attacks on healthcare organizations

According to the current SOTI study, more than three quarters of healthcare organizations in Germany are affected by cyber attacks, data leaks or data protection incidents. 95 percent of IT professionals emphasize the importance of technological innovation in their organization. The healthcare industry in Germany is increasingly relying on innovative, especially mobile, technologies to optimize processes and provide patients with comprehensive care. However, various security risks are also associated with digitization efforts: since 2021, 79 percent of organizations in the healthcare sector in Germany have been affected by a data protection incident, data leak or DDoS attack. Employee-Caused Data Leaks Showing…

Read more

Secure collaboration with the content collaboration platform
Secure collaboration with the content collaboration platform

Modern teamwork with real-time content collaboration offers more security, is accessible and makes administration easier than ever. A new antivirus service protects against Trojans, viruses and other malware. The new, third version of ownCloud Infinite Scale is now accessible according to WCAG 2.1, improves GDPR compliance and further expands the Spaces feature. It also comes with a faster and more flexible WebUI, simplifies administration and offers numerous new functions, including for even more security. New Antivirus Service and File Firewall A new antivirus service protects against Trojans, viruses and other…

Read more

Pay attention to data security when changing cloud providers
Pay attention to data security when changing cloud providers

It is not uncommon for companies to consider changing cloud providers because of service offerings or because of economic aspects. However, in addition to many valid reasons, data protection should always play an important role in the decision. There are many reasons for companies to switch cloud providers, whether from or to large or smaller providers. One of the more common reasons, in addition to the different range of services, is certainly the pricing of the cloud providers. For example, Microsoft has introduced significant price increases for its cloud services in the euro area since April 2023, which could prompt companies to consider switching providers. Out of…

Read more

Zero trust, especially with patient data
Zero trust when it comes to patient data

Wherever data needs to be protected, the Zero Trust principle is an indispensable security approach - especially in the healthcare sector. Cyber ​​attacks are increasing rapidly there. As healthcare organizations continue to go digital, one thing has become clear: the well-being of patients cannot come first if the digital systems that support them are compromised. According to the Journal of the American Medical Association (JAMA), the frequency of cyberattacks on hospitals and healthcare systems will more than double between 2016 and 2021. Research by Check Point Software Technologies confirms this trend and shows that…

Read more

Digital safe for the boss
Digital safe for the boss

In the digital age, it is becoming increasingly difficult for the bosses of medium-sized companies to keep confidential files under lock and key without making themselves dependent on the IT specialists in the company. A digital boss safe can help. The boss safe that was common in the old days is of no use today because the documents are all digital and therefore cannot simply be locked away. Many bosses, especially in medium-sized companies, find it very difficult to blindly trust the IT administrator, a trainee or an external service company who can view all data on the company server without limitation. TeamDrive solves this dilemma...

Read more

Configuration error: easy game for hackers
Network security configuration error hackers

Even if cyber criminals and hackers use increasingly sophisticated attack techniques to break into company networks, security breaches can often be traced back to avoidable, often overlooked misconfigurations. In order not to open the door to hackers to sensitive data and IT environments, here are the five most common configuration errors that companies should avoid. 1. Standard credentials Unconfigured standard user names and passwords for devices, databases, and installations are comparable to leaving the key in a locked door. Even hobby hackers can cause extensive damage to a company with the help of freely available tools. Standard login data on network devices such as ...

Read more

it-sa 365 starts on October 6, 2020
it-sa 365 logo

The new digital IT security platform it-sa 365 starts on October 6, 2020. The platform is not just a digital trade fair, but a new format that aims to bring providers and customers together. It-sa 365 is freely accessible to registered participants 365 days a year. It-sa 365 promises a comprehensive directory of providers and solutions, interactive dialogue formats and news from the world of cybersecurity. The IT security platform, which will be available all year round from October 6th, “ties a link between the trade fair dates”, as Frank Venjakob, Executive Director it -sa, formulated. The platform that can then be reached at itsa365.de is ...

Read more