"I think like a Hacker" - Why I chose the job of pentester!
by Svenja Koch
I have decided to pursue a career as a pentester. Anyone who wants to work in this professional field must have a natural curiosity as well as in-depth knowledge of IT security and network administration. Creativity and a never-ending drive to achieve one's set goal are also important. In this article, I explain what my everyday life is like, what a pentester earns and what qualifications are necessary.
Read more … "I think like a Hacker" - Why I chose the job of pentester!
Kaseya, an IT solutions developer for MSPs and enterprise customers, announced on 2 July that it was the victim of a cyberattack. Cybercriminals exploited a vulnerability in the US IT service provider's VSA management software and targeted hundreds of companies through the supply chain effect. Consequences were felt as far away as Sweden, where the supermarket chain Coop had to close almost all its shops.
Read more … Supply Chain Attack on Kaseya: Is the Same Security Fiasco Looming as at SolarWinds?
Cyber attacks, manipulation, disinformation campaigns: How secure is the 2021 federal election? An assessment.
by Svenja Koch
It is still unclear which color combination from the party landscape will govern after the federal election. Still, one thing seems certain: Disinformation campaigns and cyberattacks will accompany the online election campaign. At least, that is the conviction of Arne Schönbohm, President of the German Federal Office for Information Security (BSI). But what is the truth behind the fears of manipulation of the Bundestag election, and how secure is the 2021 Bundestag election?
When do I have to report a cyber attack according to the GDPR and when not? 18 examples!
by Svenja Koch
Part of the EU General Data Protection Regulation introduced in 2018 is the obligation to report data security breaches to the competent authority. There is still a lack of clarity for many companies regarding which cyberattacks and IT security incidents are actually reportable. This article provides 18 examples of data breaches that occur in practice and are reportable.
Read more … When do I have to report a cyber attack according to the GDPR and when not? 18 examples!
M&A process successfully completed! And where has IT security gone? 6 tips to reduce the risk of cyber threats!
by Svenja Koch
The relevance of a carefully executed IT integration is still underestimated by the management. IT integration must not cost anything and must be completed in the shortest possible time, according to management. The problem is that the dependency of business processes on IT is enormous. This article explains why you have to pay special attention to IT and how you can reliably maintain IT security during a system migration.
Welcome, Hela! Implementation and commissioning of our 24/7 network monitoring ACD successfully completed!
by Svenja Koch
Hela Gewürzwerke relies on secion's Managed Service ACD in the area of cyber defense! Read more about the role of Hela's cyber insurance in our success story!
The use of Artificial Intelligence in companies: Where are we and what will the future bring?
by Svenja Koch
Artificial Intelligence - one of the buzzwords in IT in recent years. In which direction is artificial intelligence actually developing? Do AI investments make sense at this point in time or have companies that do not yet use AI applications already missed the boat? Does AI possibly even pose risks for IT security or is artificial intelligence - on the contrary - even an enrichment for security?
The Bizarro banking Trojan is a malware that uses sophisticated social engineering to steal online banking access data. Bizarro is not the only banking Trojan whose spread is increasing sharply in the first half of 2021. The malware is flanked by Flubot - another malware that targets smartphones and tablets. We will show you the ways in which the current banking Trojans want to access your data and give you tips on how to protect yourself from the cyberthreats.
Read more … After Flubot now Bizarro: 7 tips on how to protect yourself from banking Trojans!
In demand like never before: 8 exciting jobs in the IT industry that are becoming increasingly important now!
by Svenja Koch
The IT industry is part of a fast-moving professional sector - thousands of jobs have therefore opened up for IT graduates in recent years. Employers continue to search desperately for qualified IT staff. However, according to a study by staffing firm Robert Half, 90 percent of recruiters find it difficult to find suitable employees. Who are employers looking for most urgently? Which field or specialization offers the best job opportunities? In this article, we look at eight of the most sought-after IT jobs.
Subscription malware on the criminal fast track - already heard of Ransomware-as-a-Service?
by Svenja Koch
A new "service" is currently enjoying criminal success on the Darknet and posing a new challenge to the IT security of companies worldwide. Ransomware-as-a-Service (RaaS) is the name of the new trend - and can turn any petty criminal into a cyber extortionist in no time. This article explains what exactly Ransomware-as-a-Service is and what this form of cyber attack means for IT security.