MFA Fatigue: Everything You Need to Know About the New Hacking Strategy

By |2022-10-05T11:01:08+02:0030 / 09 / 2022|Data Privacy|

With cybercrime on the rise, more and more organizations are implementing best practices such as multi-factor authentication (MFA) to protect their users from credential theft, phishing attempts and brute-force password guessing. To get around this added layer of protection, hacking groups have developed a new tactic: MFA fatigue relies on spamming victims with endless [...]

How to Prevent Data Theft by Employees

By |2022-08-11T11:48:05+02:0030 / 05 / 2022|Data Privacy|

Hackers, trojans, phishing mails, ransomware – those are terms that spring to mind when we hear the word “cyberthreat”. And while of course businesses are well advised to invest in measures to stop these external threats from getting in, there is another common threat that is often overlooked – data theft by employees. Especially [...]

Zero Trust Explained: Everything You Need to Know About the New Security Model

By |2022-09-16T10:19:46+02:0015 / 02 / 2022|Data Privacy|

In the world of IT security, trust is a luxury you can no longer afford. To protect against the growing frequency and sophistication of cyberattacks, even users and devices within your own network can no longer be trusted implicitly, but have to verify their identity on an ongoing basis. This approach, more commonly known [...]

TISAX Certification – Requirements, Levels & Costs

By |2022-07-19T10:01:24+02:0004 / 08 / 2021|Data Privacy|

Faster, better, and ultra-high-tech: The automotive industry is booming. To guarantee high standards throughout the planning and manufacturing process, manufacturers work very closely with their suppliers, often involving them directly in product development processes. To do so, however, they have to pass on highly sensitive data. But the loss or misuse of this information [...]

Ransomware Protection for Businesses: How to Keep Your Company Safe

By |2022-09-12T15:30:26+02:0013 / 07 / 2021|Data Privacy|

Hackers holding your data hostage: It's a nightmare scenario, but one that has become all too real for many companies. With ransomware attacks on the rise across the globe, more and more businesses are asking themselves how they can prevent their organization from being hit. In this article, we'll cover the most important steps [...]

Is Cyber Insurance Worth It? Advantages, Coverage & Requirements Explained

By |2022-07-19T09:59:36+02:0008 / 07 / 2021|Data Privacy|

Sometimes a single click is all it takes: One of your employees falls victim to a malicious email, clicks on a phishing link and suddenly malware begins to spread across your system. If you are following the principle of least privilege, it can help you limit the spread, but even under optimal circumstances, a [...]

The DSP Toolkit – What Is It All About?

By |2022-02-24T13:32:41+01:0016 / 03 / 2021|Data Privacy|

How are the people in your organisation handling data? Who has access to confidential data, who approved it and why? What processes are in place to prevent and/or detect security breaches and what processes ensure that confidential patient data is well protected and being treated with appropriate care? Is the technology you are using [...]

Principle of Least Privilege: Access Management and Data Protection

By |2022-07-19T10:06:53+02:0012 / 01 / 2021|Data Privacy|

The principle of least privilege or POLP, sometimes also known as the principle of minimal privilege or least authority, is a best practice in the field of information security. It demands that each user and application is only assigned the minimum level of access required to perform their duties. POLP ensures that users do not accumulate [...]

Reference Users – An Underestimated Risk

By |2022-07-19T10:07:43+02:0027 / 10 / 2020|Data Privacy|

“Meet our new team member, Sarah. She’ll be needing same privileges as Gary, please.” What’s that noise, you ask? Oh, those are just the alarm bells chiming at the sound of the above briefing. Today, we’re going to explore the concept of reference users (also referred to as user templates) and discuss why they [...]

The Hospital Future Act: Multi-Billion Grants for IT Security

By |2022-07-19T10:32:05+02:0021 / 09 / 2020|Data Privacy|

There is good reason why erectile dysfunction, nose jobs and diagnostic findings should be treated with confidentiality. The problem is that hospital servers are not as discreet as your regular physician if not sufficiently protected against hacker attacks or data theft. As medical technology is advancing, the risk of sensitive patient data falling into the wrong hands is also [...]

Go to Top