News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

VPN tunnel: security often falls by the wayside

During the pandemic, many companies set up fast VPN tunnels to enable safe work in the home office. Often, however, concessions were made, which malicious hackers are now exploiting. When more and more employees were sent to the home office during the corona pandemic, companies often had no choice but to set up so-called Virtual Private Networks (VPNs) in a hurry. These make it possible to access the company networks and thus programs and files from outside via a secure connection. But due to the prevailing time pressure and the lack of experience in managing such connections ...

Read more

Errors in the DNS configuration lead to failures
F5 news

Most corporate DNS problems arise from misconfiguration. Roman Borovits, Senior Systems Engineer DACH at F5, describes the most common errors and simple protective measures for the DNS. The Domain Name System (DNS) is one of the most important protocols on the Internet. It is often boldly referred to as the “Internet phone book”. In fact, DNS is a decentralized directory with which individual host names such as “www.f5.com” are translated into an IP address such as “18.66.122.15”. Small mistake - big effect So it is clear: If there is a problem with the service, find ...

Read more

Configuration error: easy game for hackers
Network security configuration error hackers

Even if cyber criminals and hackers use increasingly sophisticated attack techniques to break into company networks, security breaches can often be traced back to avoidable, often overlooked misconfigurations. In order not to open the door to hackers to sensitive data and IT environments, here are the five most common configuration errors that companies should avoid. 1. Standard credentials Unconfigured standard user names and passwords for devices, databases, and installations are comparable to leaving the key in a locked door. Even hobby hackers can cause extensive damage to a company with the help of freely available tools. Standard login data on network devices such as ...

Read more