Facebook iconTwitter icon
B2B-Network:
Analysis
The Key to Organizational IT Security and Compliance
Thumb compliance itsicherheit

IT security and compliance are critical to the success of an organization. Without a proper IT security and compliance set up, an organization can't effectively protect its assets, which puts is entire existence at risk. Both IT security and compliance help the organization to strengthen security, improve processes, meet regulatory requirements, and achieve other important business objectives. IT security and compliance are the frameworks that provide a common language that can be used from server rooms to boardrooms.

For many IT professionals, IT security and compliance are more or...

» Read more
Studie
Gemalto Global Cloud Data Security Study: The Cloud As A Risk?!
Thumb cloudx

Many european countries have always focused on protecting the assets stored in their corporate clouds. One of these is UK and Germany. However, the United Kingdom now seems to fall behind. This is according to the recent study that Gemalto, a digital security company, has conducted. 

 

Data Privacy and Protection

The need to regulate data in the cloud has continually been dire since customer information and payment information among other vital information are always at stake, because of their high level of sensitivity. Hence, many companies have...

» Read more
News
Meltdown & Spectre: The Two Bugs that Can Penetrate Your Processor
Thumb sicherheitslu%cc%88cke

Processors are designed to protect the most sensitive memory part of billions of computers. So what happens, if the processor can no longer accomplish this task? Recent research conducted by Google's Project Zero Team indicates that two primary flaws are affecting modern computers running on Intel, AMD, and ARM processors.

The flaws which are now referred to as Meltdown and Spectre work by isolating untrusted computer programs from accessing some processes on the device or the deep layers of the OS where sensitive information is stored. Hackers are only required to run a certain...

» Read more
Analysis
Multi factor Authentication Fights Back Against Hackers
Thumb fingerabdruck

Multifactor Authentication (or MFA for short) is a security method that uses more than one type of authentication to check a user’s identity when logging in or completing a transaction. The goal is to build several layers of defense against hackers trying to gain access to accounts, computers, networks, or databases. 
 

What is MFA?

MFA uses a combination of two or more independent methods of checking identity. These include something a user knows, something they physically have in their possession or a physical trait they possess. If a hacker defeats one of these checks,...

» Read more
Practical Advice
4 Measurements to protect your business from ransomware attacks
Thumb ransomware3

Ransomware has been a dangerous threat to many small and large businesses for over six years now. Unfortunately, this type of cybercrime isn’t going away, but it can be prevented. Here are some tips on how you can protect your business from ransomware attacks. 

 

1. Update your computer system regularly

Cyber criminals usually find it easier to attack older versions of operating systems and browsers. However, if you keep all your business computers constantly updated, hackers will be less prepared to attack them as they won’t be able to figure out how to compromise the...

» Read more
Practical Advice
Embracing Shadow IT in businesses
Thumb schatten

What happens when employees feel that the IT department is not being innovative enough to fulfilling their needs? Employees may become less innovative and inefficient in their duties, but with the pressures of performing on today's workplace, they tend to find solutions elsewhere. This is why shadow IT is quickly growing as an alternative solution.

 

What is Shadow IT?

When technology is implemented by an individual or team without the approval of the IT team it is shadow IT. For example, an entire department may decide to use a different cloud computing environment from the rest...

» Read more
Analysis
Why cyber wars are a real threat
Thumb war

In recent years, cyber conflict has become cheap, dangerous and increasingly rampant. From the recent allegations of Russia interfering with the US-election to North Korea hacking Sony because it dissaproved a particular movie, the world seems to be trending on dangerous grounds. It could only be a matter of time before a cyberwar escalates into real war. However, the future is not all bleak if some principles are established to determine how governments conduct themselves when it comes to cyber conflict. 

 

The changing face of cyber conflict 

While it used to...

» Read more
Analysis
The Growing Threat of Hackers Within the Energy Sector
Thumb windrad

As the world becomes increasingly interconnected, the threat of hackers is now very real. Recent examples such as the global ransomware Petya highlight this point. However, there are some industries which are more vulnerable than others and should their systems become compromised, the results could be grave. One example is the energy sector. The primary reason why this environment is so welcoming to potential hackers is that a maximum amount of disruption can be caused with a relatively minimal amount of effort. As threats continue to emerge, professionals will be forced to take even more...

» Read more
Comment
Cybersecurity Stress Tests: Proactive Solutions for Modern Times
Thumb test

Although the majority of small- to medium-sized enterprises have contingency plans in place to deal with security issues, it is estimated that a mere 14 per cent have actually carried out tests to gauge the efficacy of these systems – according to a research by Policy Bee. This is a critical concern, as it is otherwise very difficult to uncover any weak points within existing IT infrastructure. What is a stress test and how can one be conducted in order to tackle potential threats or vulnerabilities?

 

Cybersecurity Stress Tests at a Glance

Any stress test primarily involves...

» Read more
Event
Largest IT Security Exhibition Fare IT-sa
Thumb it sa

Have you ever thought what would happen, if IT systems in your organisation become vulnerable to security threats? Losing the information stored in the systems is likely to occur. Alternatively, the threats can destroy entire computer databases leading to adverse losses in the firm. Such damage happened, when a software called Wanna Cry ransom paralysed hundreds of thousands of computer programmes, including; systems used in hospitals and the German railway. Following this, IT-sa will be holding once again the largest IT security fair in Europe. From October 10th-12th,...

» Read more
Loader