News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

The right strategy after a data loss
The right strategy after a data loss KI-MS

Companies around the world face numerous threats. International studies also show this. A study by Arcserve shows that 76 percent of companies have suffered a serious data loss. In this context, 83 percent described downtime of 12 hours or less as acceptable. 10 tips for a successful business continuity plan. As an Arcserve study shows, only 52 percent of affected companies were able to recover from their data loss in 12 hours or less. Although 95 percent of companies said they had a disaster recovery plan, only a small…

Read more

Autonomous cyber security strategy
Autonomous cyber security strategy

In order to successfully respond to the constant and rapid evolution of the threat landscape, companies will need to implement largely autonomous functions into their IT security strategy that can support cybersecurity systems in real time. With ongoing developments in artificial intelligence (AI), which enables hackers to carry out fast and precise attacks, companies must adopt similar technologies. This means you can always be one step ahead of the attackers. As the compliance landscape continues to evolve, organizations must recognize that a lack of preparedness could pose a serious threat to their success. The integration of an autonomous system will…

Read more

Only 7 percent of German companies are prepared for AI
Only 7% of German companies are prepared for AI

8.000 managers in 30 countries took part in the “AI Readiness” study and commented on the use of AI in the company. Germany is ill-prepared. IT infrastructure and cybersecurity are cited as the highest priority areas for the use of AI. 14 percent of companies worldwide are fully prepared to use AI - in Germany only 7 percent. This is shown by Cisco's first AI Readiness Index, for which over 8.000 companies were surveyed, more than 300 in Germany alone. Compared to seven other EU countries and Great Britain, Germany is...

Read more

Data resiliency is much more than backup
Data resiliency is much more than backup

Data resiliency isn't a technology, it's not a solution, it's a mindset that all organizations should embrace. Its primary purpose is to fulfill business continuity and to create business continuity plans. A comment by Florian Malecki, Arcserve. The good news: According to a global study by Arcserve, 83 percent of IT decision makers include data resiliency in their business continuity strategies. On the downside, only 23 percent have a mature approach to data resiliency. This is by no means enough, even with benevolent consideration, because a…

Read more

US Government: New Cyber ​​Security Strategy
US Government: New Cyber ​​Security Strategy

The US government under President Biden has published a new cyber security strategy. The almost 40-page strategy paper is also clearly about making IT companies more responsible and holding them accountable if they are disregarded. But the already successful fight against APT groups and ransomware is also to be intensified. The Biden-Harris Administration releases the National Cybersecurity Strategy to ensure the full benefits of a secure digital ecosystem for all Americans. In this pivotal decade, the United States seeks to reinvent cyberspace as a tool to achieve its goals in a way that...

Read more

Whitelist DNS Filters and Remote Browsers vs. Ransomware
Whitelist DNS Filters and Remote Browsers vs. Ransomware

IT security expert ProSoft recommends two defense strategies against ransomware attacks on company IT: Whitelist DNS filters and remote browsers are successful against ransomware. Twelve percent of all cyber attacks are now carried out by ransomware (source Global Threat Intelligence Report by NTT). Corresponding attacks have thus quadrupled in recent years. The financial damage caused by such an attack is also increasing rapidly. With DNS filtering and ReCoBs (Remote Controlled Browser System), IT security expert, trusted advisor and value-added distributor ProSoft shows two effective but fundamentally different strategies against ransomware attacks. While a DNS filter detects and blocks dangerous websites before…

Read more

Cyber ​​risks in the software supply chain
Cyber ​​risks in the software supply chain

Log4Shell or Solarwinds are typical examples of attacks on companies through their software supply chain. It is characteristic that cybercriminals do not gain direct access to the target company, but attack via a back door. A comment from Trend Micro. If you look back at some recent attacks (esp. Solarwinds or Log4Shell), you will notice that they are playing more and more "over gangs". This means that the attackers no longer attack target companies directly, but via their (software) supply chain. Whether victims are attacked via compromised Solarwinds updates or vulnerabilities in Log4Shell - in both...

Read more

What executives should know about ransomware attacks
What executives should know about ransomware attacks

Like most industries, cybercriminals have adapted and changed over the past two years as circumstances have changed. They have a wealth of evolving tools in their arsenal and are able to leverage many vectors to get to their destination: the valuable enterprise data. Varonis experts explain what every executive needs to know about modern ransomware attacks. This is how modern attackers have learned to launch even more disruptive ransomware campaigns. At the same time, they have become more efficient and adept at avoiding prosecution. How ransomware groups form after a…

Read more

IT security in times of the Ukraine war
IT security in times of the Ukraine war

It is still unclear whether a real cyber conflict will be added to the analogous Ukraine war – if such a conflict can be precisely defined at all. In any case, the current armed conflict poses a risk for the IT security of companies, even if it remains to be seen how the further risk situation will develop. In order to protect themselves effectively, companies should, on the one hand, keep an eye on current dangers and, on the other hand, follow security standards even more strictly. The company's own risk potential is measured by the geographic, business or even digital proximity of an organization to Ukraine. A defense...

Read more

Why is backup actually so complicated?
Why is backup actually so complicated?

Without a backup, a company can quickly lose out in terms of RTO, RPO or ransomware. With the right strategy for backups, IT does not stand still even after an attack. The free white paper "Why is backup actually so complicated?" provides the right answers to many questions. A backup serves to protect against data loss. If an original is lost, you still have a copy as a safeguard, as a "backup". This is how easy data protection could be in a world without RTO and RPO, ransomware and natural disasters. But nowadays, an IT administrator has to think a lot more...

Read more