News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Lancom: Best VPN provider in the Professional User Rating 2022
B2B Cyber ​​Security ShortNews

The German network and security manufacturer LANCOM Systems confirmed its top position in this year's "Professional User Rating Security Solutions" by the analyst firm techconsult. For the sixth time in a row, LANCOM received the best user ratings in the Virtual Private Network (VPN) solution area and was once again the frontrunner in Germany's largest user study in the field of IT security. For the independent study, techconsult surveyed over 2021 application experts from security solutions in October 2.000 about their satisfaction with market-relevant solutions and their providers. Both in the solution and in the manufacturer rating, the users attested to LANCOM in all the...

Read more

Spyware campaigns: 2.000 industrial companies attacked
Spyware campaigns: 2.000 industrial companies attacked

Kaspersky experts have discovered a new, rapidly evolving series of spyware campaigns targeting over 2.000 industrial companies worldwide, stating: short-lived attack scenarios are increasing, data is being offered for sale on marketplaces, an estimated 7.000 compromised or stolen corporate accounts. Unlike many traditional spyware attacks, these attacks have a limited number of targets and a very short lifespan for each malicious program. The captured data was offered for sale on more than 25 marketplaces. Company data on 25 marketplaces for sale In the first half of 2021, the experts of the…

Read more

Email security: the important second check
Email security: the important second check

Phishing and ransomware attacks: Given the sheer volume of emails, errors are inevitable. Implementing critical double checking to improve email security is vital. Business reliance on email creates a huge cybersecurity risk. And not just because of the increasing and increasingly intelligent phishing and ransomware attacks. Given the sheer volume of emails sent and received per day (over 300 billion per day in 2020), errors are inevitable. Employees are entrusted with in-house data and assets, and many are allowed to conduct financial transactions - often ...

Read more

More BEC Attacks - Business Email Compromise
Kaspersky_news

The Kaspersky experts are increasingly observing BEC attacks (Business Email Compromise) - also in Germany. Between May and July 2021, Kaspersky products blocked more than 9.500 attacks of this type worldwide, including against companies in the aviation, industrial, retail, IT and delivery sectors. In a BEC attack, fraudsters usually initiate an email exchange with an employee of a company in order to gain their trust and thus induce them to take actions that harm the interests of the company or its customers. For this purpose, fraudsters often use hijacked e-mail accounts or e-mail addresses of employees that are visually ...

Read more

10 tips to ward off ransomware

According to F2021 Labs' Application Protection Report 5, ransomware is one of the biggest threats to data security. Here are 10 tips for companies on which current security measures they should implement. By Roman Borovits, Senior Systems Engineer DACH F5. 1. Multifactor authentication Conventional passwords are no longer sufficient: Multifactor authentication (MFA) should be required to access all systems with important data. If MFA cannot be set up everywhere, it should be used with all administrative accounts first. Remote access has the next priority. Then MFA for e-mails has to be introduced, whereby most of the ...

Read more

Cloud Security Guide
Cloud Security Guide

Bundesverband IT-Sicherheit eV (TeleTrusT) publishes “Cloud Security” guidelines. Cloud computing is now a widely accepted IT operating model and is used by most companies. Many IT providers have changed their strategy to "Cloud First", some even to "Cloud Only". The threat situation has also changed: cloud platforms are increasingly in the focus of cybercrime. The secure use of cloud services is therefore a central component of the IT security of companies as a whole. The TeleTrusT guide "Cloud Security" is primarily aimed at small and medium-sized companies. It includes a systematic consideration of the risks involved in using...

Read more

Jamf invests in new security features
Jamf invests in new security features

Apple device management software provider Jamf is investing in new security features. These help organizations protect sensitive data, comply with company guidelines and give employees seamless access to information. To this end, Jamf publishes a passwordless authentication workflow, brings a simplified compliance solution to the market and continues to research security threats for Apple devices. Secure access to workplace applications Stolen or compromised passwords are a serious security threat. IT administrators try to combat this with strict password guidelines. However, strong passwords have the disadvantage that they are difficult for users to remember. Not least because of this, employees often use passwords ...

Read more

20.5.21/XNUMX/XNUMX webinar: IoT security - this is how companies protect themselves
F Secure News

Attend F-Secure's free online seminar on "IoT security basics: How companies protect themselves" on May 20, 2021 from probably 10:00 to 10:30 a.m. The transparency in your own company network will also be endangered in 2021 by the use of Internet-of-Things (IoT) devices. Not knowing what the devices send back and what kind of influence an attacker can gain on the device - and therefore on the data - is still one of the biggest disadvantages of buying "smart" devices. Online seminar on May 20.05.21th, 10.00 at XNUMX:XNUMX a.m. If a secure…

Read more

Win 10: BSI provides security settings
B2B Cyber ​​Security ShortNews

The Federal Office for Information Security (BSI) has published recommendations for action to secure Windows systems in German and English as part of the “Study on system structure, logging, hardening and security functions in Windows 10” (SiSyPHuS Win10). Most of the successful attacks on IT systems with Microsoft Windows 10 can already be detected or prevented with the on-board tools available in the operating system. In order to facilitate the necessary configuration of the operating system, the Federal Office for Information Security (BSI), as part of the "Study on system structure, logging, hardening and security functions in Windows 10" (SiSyPHuS Win10) ...

Read more

Doxing: Special attacks on companies

Kaspersky warns of a new cyber threat for companies: With 'corporate doxing', methods of doxing, which have so far been more familiar from the private sector, are used in the context of targeted attacks: whether simple e-mail or deep fake. Kaspersky experts are currently observing a particularly large number of attacks using fake business emails (Business Email Compromise, BEC). At the same time, tricks for faking false identities (identity theft) are becoming more sophisticated. For example, deceptively real voices are already being imitated with the help of artificial intelligence, for example from board members or other high-ranking executives, with the help of which employees are enticed to disclose confidential information or to transfer funds....

Read more