Cyber Security Blog

Dive with us into the world of hackers, data espionage, and attack defense - several times a week for free!

The number of ransomware attacks has increased enormously in recent years. Due to the Corona pandemic, many employees still work from home. This situation has created new challenges for corporate IT security. Home office security vulnerabilities threaten both employees and the entire corporate network. 10 tips from our experts improve your ransomware protection and help to effectively close the home office security gaps.

Cyber threats know no seasons, no country borders and no opening hours. By now, almost every company is at risk of becoming the target of a planned cyber attack. If you do not have a fully developed cyber emergency plan ready in your drawer, the consequences can be drastic. With our hacking attack tips, we would like to provide you with first aid in the event of a cyberattack. Find out here which measures you and your IT security should definitely take - and why the help of security experts is advisable if the worst comes to the worst.

Cyber threats are omnipresent and can threaten the existence of companies - this is now widely known. At the same time, there are still glaring gaps in the area of IT security measures in many companies. IT security management aims to comprehensively prepare companies for potential cyber threats. The current and future IT security situation requires a broad and specialised set-up of IT security management. A guide with 5 important measures that should not be missing in any case!

At the beginning of July 2021, a cyber attack occurred on the IT service provider Kaseya. This attack had a global impact, as it was an attack on the company's supply chain. In Sweden, for example, up to 800 branches of the supermarket chain Coop had to close for days because the cash register systems were not available. About a month after the incident, Kaseya is still struggling with the consequences of the attack. Our update on the consequences of the spectacular cyber attack!

With the proposed changes, the EU Commission wants to close gaps in existing laws and improve citizens' IT security. Current legislation no longer fits the digital reality. Anonymous accounts on crypto exchanges not only facilitate money laundering, they also provide hackers with an ideal environment for processing extortion payments as part of cyber attacks.

The growing number of cyberthreats and cyberattacks is placing ever greater demands on IT security. This now affects all companies - from individual companies to global corporations - primarily due to the high degree of digitalisation. As a result, new professions in IT security are constantly emerging. One of these is the cyber security analyst. A profession with a lot of responsibility, good earning opportunities and, above all, a high degree of future security.

At the beginning of June 2021, the German government extended the "Digital. Secure. Sovereign." by five years. At the same time, funding was increased from 180 to 350 million euros. These funds will flow into IT security research, among other things. Over the next few years, the federal government intends to drive forward IT security research and the digitization of SMEs with targeted funding programs. What funding programs has the federal government decided on and what is their scope?

While manufacturing companies invest extensively in the necessary digital infrastructure for the IIOT (Industrial Internet of Things), IT security usually falls by the wayside. IT security measures against cyber threats and various cyber attacks are too often still based on outdated security concepts. This article explains why multi-layered cyber defence systems are now indispensable and how threat hunting and active cyber defence can significantly increase IT security in a production company.

The entire world is becoming more digital - and this development does not stop at the health sector. The increasingly targeted cyber attacks, which affect the CRITIS sector in particular, make it essential to upgrade IT security in hospitals and similar healthcare facilities. Minimum standards for IT security, CRITIS requirements, certifications and guidelines can significantly increase IT security in a hospital. The central goal is to prevent cyber threats from interfering with daily operations.