Helmut Semmelmayer

About Helmut Semmelmayer

Helmut Semmelmayer has been Senior Manager Channel Sales at the software company tenfold since 2012. He is in charge of partner sales and product marketing and regularly blogs about issues and topics related to identity and access management.

tenfold at it-sa 2019 – Secure your free ticket now!

By |2019-08-19T14:59:49+00:0019 / 08 / 2019|BLOG|

Europe’s largest IT security fair, the it-sa in Nuremberg, will take place from October 8th – 10th, 2019. It is one of the world’s most recognized platforms for cloud, mobile and cyber security, as well as for data and network security. Since 2009, it-sa in Nuremberg has been the number one meeting place for security [...]

A hospital in The Hague was fined € 460,000 for violation of the GDPR.

By |2019-08-06T14:03:08+00:0006 / 08 / 2019|BLOG|

A hospital in The Hague was fined € 460,000 for violation of the GDPR. The Dutch supervisory authority "Autoriteit Persoonsgegevens" recently announced that the fine was imposed in 2018. Hospital Staff Spied Out Prominent Patient The incident occurred while famous reality TV star Samantha de Jong was at Haga Hospital. Staff members gained access [...]

Desjardins Bank: Data Stolen From 2,9 Million Customers

By |2019-07-09T15:37:49+00:0009 / 07 / 2019|BLOG|

The Canadian cooperative bank Desjardins and the domestic authorities are currently dealing with a particularly serious case of data theft. A bank employee, who has since been dismissed, swiped the personal data of roughly 2.9 million customers. About 40% of Desjardins' customers are affected by the incident. Back in December 2018, the bank had [...]

Adopt Existing Structures With tenfold’s New Import Feature

By |2019-06-06T15:21:07+00:0003 / 06 / 2019|BLOG|

Existing Structures tenfold offers comfortable features that help users with the administration file server structures. tenfold manages these structures transparently, fully automated and always in compliance with Microsoft’s recommended AGDLP principle. But what to do with file server groups that are already established? Not every project begins with a blank slate; structures will have [...]

Data Theft From Within – How To Protect Yourself

By |2019-06-13T19:39:07+00:0007 / 05 / 2019|BLOG|

Reports of companies being hit by cyber-attacks and hacking attempts are on the rise, as security specialists work around the clock to find ways to protect sensitive data from these external attacks – when, actually, the real danger lurks within: data theft is most commonly committed by internal staff. According to Germany’s domestic intelligence [...]

Fight Ransomware – With Access Management

By |2019-05-21T17:22:42+00:0030 / 04 / 2019|BLOG|

Ransomware is considered one of the biggest IT threats of our time. A recent increase in the number of attacks has proven observers right on this account. phonixNAP has compiled some disturbing facts concerning ransomware: The average damage of a ransomware attack on a company is roughly 130.000 US Dollars The total damage to [...]

Could you be affected? Learn about the Top 5 risks in access management

By |2019-07-25T15:30:05+00:0029 / 04 / 2019|BLOG|

Have you lost track? IT departments often find it challenging to determine which staff members have access to specific company data. This is due to a number of issues: Multiple systems: Most IT users will not just be registered and activated for the Active Directory, but they will have data in, and access to, [...]

NTFS Permissions and Share Permissions – What’s the difference?

By |2019-05-21T08:50:44+00:0018 / 04 / 2019|BLOG|

What are NTFS permissions? NTFS permissions govern access to files and directories on Windows drives. These permissions apply regardless of whether the files are accessed locally from a computer or using a share via the network. NTFS permissions can be set by right-clicking on a folder and selecting “Properties“ from the menu. Navigate to [...]

Hacking MFA & Privilege Escalation: From Helpdesk Agent to Domain Admin in only 3 Minutes

By |2019-03-19T11:41:47+00:0019 / 02 / 2019|BLOG, BLOG|

MFA Basics MFA (Multi-Factor-Authentication) requires not just one factor (e.g. a password) but two - or even several - factors for user authentication. Common examples are OTP (One Time Passwords) generated by a token, or smart cards. Generally, we speak of authentication in two forms: Password: Something I know Smart card / token: Something [...]

Recertification – bringing structure to your access landscape

By |2019-06-18T09:08:03+00:0019 / 02 / 2019|BLOG, BLOG|

While most companies have structured processes for assigning access rights in place, they tend to neglect the removal of rights that have become obsolete. We therefore often come across organizations with a chaotic access landscape: Access rights, once carefully selected and assigned, become autonomous over time. Employees switching departments, resigning or receiving special rights [...]