TISAX Certification – Requirements, Levels & Costs

By |2021-10-19T11:26:56+02:0004 / 08 / 2021|Data Privacy|

Faster, better, and ultra-high-tech: The automotive industry is booming. To guarantee high standards throughout the planning and manufacturing process, manufacturers work very closely with their suppliers, often involving them directly in product development processes. To do so, however, they have to pass on highly sensitive data. But the loss or misuse of this information [...]

Ransomware Protection for Businesses: How to Keep Your Company Safe

By |2021-07-13T15:51:36+02:0013 / 07 / 2021|Data Privacy|

Hackers holding your data hostage: It's a nightmare scenario, but one that has become all too real for many companies. With ransomware attacks on the rise across the globe, more and more businesses are asking themselves how they can prevent their organization from being hit. In this article, we'll cover the most important steps [...]

Is Cyber Insurance Worth It? Advantages, Coverage & Requirements Explained

By |2021-10-20T14:05:51+02:0008 / 07 / 2021|Data Privacy|

Sometimes a single click is all it takes: One of your employees falls victim to a malicious email, clicks on a phishing link and suddenly malware begins to spread across your system. If you are following the principle of least privilege, it can help you limit the spread, but even under optimal circumstances, a [...]

The DSP Toolkit – What Is It All About?

By |2021-07-07T11:09:26+02:0016 / 03 / 2021|Data Privacy|

How are the people in your organisation handling data? Who has access to confidential data, who approved it and why? What processes are in place to prevent and/or detect security breaches and what processes ensure that confidential patient data is well protected and being treated with appropriate care? Is the technology you are using [...]

Principle of Least Privilege: Access Management and Data Protection

By |2021-09-29T14:22:29+02:0012 / 01 / 2021|Data Privacy|

The principle of least privilege, also referred to as least privilege principle, or POLP for short, is considered best practice in the field of cyber security. When used correctly and consistently, POLP ensures that individual users only have the privileges they actually need to carry out their job duties. In this article, we are going [...]

Protect Yourself Against Data Theft From Within

By |2020-12-15T12:45:09+01:0030 / 11 / 2020|Data Privacy|

Ask a group of IT officers who the real enemy of cybersecurity is and they’ll call out in unison: Trojans! Phishing mails! Hackers! Are you nodding in agreement? While indeed these threats are real and need to be addressed, there is another menace that people, including experts, tend to forget about [...]

Reference Users – An Underestimated Risk

By |2021-09-07T10:59:35+02:0027 / 10 / 2020|Data Privacy|

“Meet our new team member, Sarah. She’ll be needing same privileges as Gary, please.” What’s that noise, you ask? Oh, those are just the alarm bells chiming at the sound of the above briefing. Today, we’re going to explore the concept of reference users (also referred to as user templates) and discuss why they [...]

Law on the Future of Hospitals 2021: Multi-billion Grants for Data Security

By |2021-09-07T10:55:20+02:0021 / 09 / 2020|Data Privacy|

There is good reason why erectile dysfunctions, nose jobs and diagnostic findings should be treated with confidentiality. The problem is that hospital servers are not as discreet as your regular physician if not sufficiently protected against hacker attacks or data theft. As medical technology is advancing, the risk of sensitive patient data falling into the wrong hands is also increasing. [...]

Austria: Company Pays 4 Million Euros Ransom due to Ransomware Attack

By |2020-09-28T14:09:32+02:0019 / 12 / 2019|Data Privacy|

There are numerous reasons as to why data theft and hacking or phishing attacks occur: outdated systems, insufficient backups and security updates and a lack of risk awareness. The results are damages in the millions – and the situation is getting worse, explains Rémi Vrignaud, head of the Allianz Group in Austria: "It is [...]

Statistics Austria: One out of Ten Companies Takes No Measures to Improve IT Security

By |2020-09-28T14:09:41+02:0009 / 12 / 2019|Data Privacy|

A survey conducted by Statistics Austria on the use of information and communication technologies in companies shows that IT security ranks high in importance among Austrian businesses. Nine out of ten companies take precautions against cyber attacks and just over half of them have contractual agreements with employees to further guarantee cyber security. Large [...]

Go to Top