Encryption in data protection

Encryption in data protection

Huge amounts of data are affected by data theft and unwanted disclosures every year. Cyber criminals usually target all types of data. That's why data must be protected from unauthorized access according to your protection needs, e.g., through encryption,...
Ransomware - To pay or not to pay?

Ransomware - To pay or not to pay?

Ransomware is malware that encrypts files on the victim's computer and releases them only after a ransom is paid. The organization of cybercriminals is becoming more and more professional. What consequences a ransomware attack can have and...
2021 - The year of zero-day vulnerabilities

2021 - The year of zero-day vulnerabilities

The security researchers of Google's "Project Zero" have completed their statistics on actively exploited zero-day vulnerabilities. The conclusion: In 2021, there was a massive increase in known zero days. This would not only be due to the increase in attacks,...
Log4j vulnerability - What to do?

Log4j vulnerability - What to do?

It has recently become known that the software library called Log4j has a security vulnerability. This can be exploited very easily to take over entire IT systems or to tap data. Many cybercriminals are now exploiting this, while IT professionals...
IT security under the traffic light coalition

IT security under the traffic light coalition

On November 24, the SPD, the Greens and the FDP ("traffic light coalition") presented their coalition agreement. IT security is to be given a higher priority again in it. Instead of tightening surveillance of citizens, as has been the case in recent years,...
DSB buchen
en_USEnglish