News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

DA-CH Cyber ​​Protection: Companies feel well positioned
Cyber ​​protection: Companies feel well positioned Image: Bing - AI

According to figures from the Sophos Management Study, the growing threat of cyber attacks and the resulting potential economic consequences have prompted most companies in Germany, Austria and Switzerland to invest even more in IT security and are now satisfied with their cyber protection. As a result, most companies are satisfied with the status of their cyber protection. In Switzerland, most of those surveyed (80 percent overall) feel well (66 percent) or very well (14 percent) prepared against cyber attacks. In Austria, too, people are satisfied with their cyber protection, here it is...

Read more

IT security for everyone – free security tools
IT security for everyone - free security tools

A leading provider of connectivity cloud services is making several key security tools that are often expensive available to businesses for free, including access to its comprehensive Zero Trust platform that can automatically defend against some of the most well-known threats. One of the biggest hurdles to protecting a business is the cost of acquiring the tools needed to defend against today's sophisticated threat actors. The services required to do this have traditionally only been affordable for companies large enough to afford both the technology and the teams to implement it.

Read more

IT security: How cyber resilience changes processes
IT security: How cyber resilience changes processes

Digitalization is changing corporate cultures. More and more data is available in real time, faster and faster. But digitalization affects not only productive applications, but also data security and data backup. How can IT security be implemented and who is responsible for it? IT matter = management matter? This is not just an empty phrase, but a reality. IT is no longer just a digital desk or an extended workbench. Information and the availability of digitized processes are the basis for corporate success and are therefore central strategic components in the corporate context. At the same time, in times of increasing uncertainty and cybercriminal activities, a…

Read more

GAP analysis: Identify and close security gaps
GAP analysis: Identify and close security gaps

For more and more companies, the GAP analysis is becoming an indispensable tool for identifying and specifically resolving potential security risks. It should also be standard for small and medium-sized companies. As part of a GAP analysis, companies can evaluate their current IT security measures and identify any gaps, e.g. with regard to implemented technical and organizational measures, processes or documentation. This includes comparing the existing security protocol with industry best practices and standards (e.g. recommendations from the BSI, standards according to ISO 2700X) as well as regulatory requirements in order to get a clear picture of where...

Read more

Complex IT security: 450 end devices – 3 IT employees
Malwarebytes News

Many companies use several security solutions at the same time. This leads to a high level of complexity. Malwarebytes surveyed 50 companies in an international survey on the topic of complexity. IT departments in smaller companies often have only limited human resources. In order to be able to defend themselves against increasingly sophisticated attacks from cyber criminals - such as ransomware - many companies have invested in their security infrastructure. However, this has often increased the complexity of the IT systems - especially when different software solutions are used. On average, 3 IT employees look after 450 end devices. These are the most important results of the survey: Companies...

Read more

NIS2 Directive: Many companies are still planning
NIS2 Directive: Many companies are still planning

The NIS2 Directive is due to come into force in October of this year. So far, only a third of German companies have complied with the directive. Almost forty percent of companies have not yet taken action, but are planning to do so. 38 percent of German companies have not yet started implementing the NIS2 Directive. But it is high time: With the draft law (NIS-2 Implementation and Cyber ​​Security Strengthening Act), the Federal Ministry of the Interior and Home Affairs has set the course. The national law is due to come into force by October 17, 2024. For companies, this means...

Read more

SME: Managed security services and training
Managed security services and training for SMEs

Cyber ​​attacks are not only directed against large companies; SMEs are also often affected. There is often a lack of resources and skills for IT security there. The solution is managed security services. IT security stands as the sword of Damocles over IT managers. Why is obvious. The strong networking through IT in all areas of the company offers numerous new areas of attack. Ransomware and malware are fueling the challenge. Everyone knows someone who is affected. And it's no longer just the big companies. The danger is omnipresent and it is not a question of if you will be attacked, but when….

Read more

IT security: NIS-2 makes it a top priority
IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. This is especially the case in smaller companies. The larger the company, the less often the bosses feel responsible. Whether small and medium-sized companies or corporations: In only 25 percent of German companies does the management take responsibility for IT security. This is proven by the representative study “Cybersecurity in Numbers” by G DATA CyberDefense AG, Statista and brand eins. Cyber ​​attacks on companies and institutions cause high costs and illustrate the importance of extensive IT security measures. With…

Read more

Study: Are IT security managers too confident?
Study: Are IT security managers too confident? Image by Pete Linforth on Pixabay

While traditional IT teams in companies clearly support external experts, the majority of internal IT security managers reject outside help. But can security teams afford this or are they overconfident? An enlightening study from Trend Micro. The role of cybersecurity in the business context has undergone a significant shift: once seen as a deterrent, it is increasingly recognized as a catalyst for digitalization and business development. This emerges from a study that Trend Micro carried out together with the Brandenburg Institute for Society and Security (BIGS). Although companies therefore understand the importance...

Read more

Digitalization: Unsafe i-vehicle portals will be blocked
B2B Cyber ​​Security ShortNews

For Federal Minister Wissing it is the big hit: internet-based vehicle registration, i-Kfz for short. However, it seems that many municipalities currently do not meet the IT security standards for operating a portal - because although it is centralized in terms of data, otherwise vehicle registration is a state matter. It's not just companies that will have to meet many IT security requirements from 2024. The states and municipalities also have a lot of catching up to do. Internet-based vehicle registration, i-Kfz for short, should actually take off everywhere and thus make annoying waiting times at offices unnecessary. In many places, however, reality has prevented this wish: according to many media reports, 25...

Read more