"Sitting alone in a dark office wearing a hoodie" - The 5 biggest myths of cyber security
by Tina Siering
Cyber security experts are loners who sit in front of their computers all day in hoodies in darkened rooms, hacking lines of code upon lines of code into the keyboard, have no social life (and don't want one either) - the common opinion about working in cyber security teams is full of prejudices. The cliché from Hollywood movies, however, has little to do with reality.
Premiums for cyber insurance currently know only one direction: up. More criminal activity, an increased proportion of home office workers and the Corona pandemic have driven up premiums for what should be essential cyber insurance. According to an industry analysis, cyber insurance in the U.S. market saw a 130% price increase in 2021. For many small and medium-sized businesses, the premiums are barely affordable - or are no longer insured by providers in the first place. With ACD, the "Active Cyber Defense", there is an equally efficient and affordable alternative for reliable protection against cyber attacks. In this article, you will learn how companies can be protected against potential attacks in the best possible way, even without existing insurance coverage.
Read more … Premiums for cyber insurance soon unaffordable for SMEs? Can ACD be an alternative?
After the leak of chat logs at Conti: exceptionally deep insights into the ransomware group
by Tina Siering
The Conti gang is one of the world's most notorious, because most successful, hacker groups. With its ransomware-as-a-service business model, Conti provides cybercriminals with toolkits, instructions, and infrastructure - in short, all the accessories needed to extort ransom in the digital age. With the start of the Russian war of aggression on Ukraine, the Conti gang sided with the Russian aggressors - which apparently caused internal displeasure. At the end of February, data was leaked that provided unusually deep insights into the structures and daily routine of the ransomware group.
The hardware manufacturer HP warns that there are critical IT security vulnerabilities in more than 200 printer models. In this article, we explain what measures are now necessary to close the vulnerability and how printers can be secured in principle.
Read more … Critical security vulnerabilities in more than 200 HP printer models
Securing the online banking account, the e-mail inbox or access to the corporate cloud with a password is no longer sufficient given the current threat situation. MFA, multi-factor authentication, is a much more secure alternative for protecting sensitive areas. With MFA, two or even more credentials, so-called factors, are combined. But how exactly does multi-factor authentication work - and why should you also rely on this secure procedure? This article provides the answers.
Read more … What is multi-factor authentication (MFA) - and why is it so important?
Five questions on Threat Hunting
by Tina Siering
The increasing threat in the digital space requires a seamless IT security strategy. Threat hunting is an important building block in this concept, actively searching for cyber threats. This article provides answers to five common questions about threat hunting.
A career in IT security: The path to becoming a CISO
by Tina Siering
The professional field of IT security is an interesting career option due to the constantly high threat posed by cybercrime. One of the most responsible positions is that of the CISO, the Chief Information Security Officer. The CISO is the head of information security in an organization. He enjoys a future-proof, financially attractive job with varied tasks and creative freedom. This blog post describes the career path to the Chief Information Security Officer.
Read more … A career in IT security: The path to becoming a CISO
Due to tense cyber security situation: German companies increase their investments in IT security
by Tina Siering
54 percent of German companies have significantly increased their spending on IT security in 2021 - according to the results of a recent IT security survey conducted by the German Internet Industry Association (eco). (eco). Due to the increased threat situation in the area of cybercrime, decision-makers in companies are now investing more in IT security.
Phishing, baiting, media dropping: Social engineers are responsible for the majority of all cyber attacks! In our article, you will learn how cyber criminals proceed with their attacks and how you can protect yourself and your company from these perfidious attack methods.
Read more … The 10 most common social engineering techniques - and how to protect yourself
secion's assessment of the security threats to companies following the outbreak of the war in Ukraine
by Tina Siering
Due to the war in Ukraine, secion provides an assessment of the threat situation for companies and examines the question of whether increased Russian attacks on companies in Germany, Austria and Switzerland can be identified. There is currently no evidence of an acute increase in the threat posed by Russian state actors in Western Europe, but there is increased public awareness of these cyberattacks. In addition, "third-party actors" are creating a new dynamic.