Enemies in the home office
In the area of IT security and home office, the burdens are not distributed in favor of the companies: While they have to permanently take all security measures appropriate to the threat situation across their entire IT landscape, attackers can use a small weak point to cause massive damage. Unsecured end devices in the company or in the home office, cloud and IaaS applications, poorly secured networks or surfing the World Wide Web open up numerous opportunities for hackers to infiltrate companies and steal data. Since the latter can be easily turned into money, cyber criminals have a correspondingly high level of motivation to refine their attack techniques and ...