Posts tagged with "Cyber Security"



Response, Responsibility, and Legal Exposure
Blog | Endpoint Protection · 16. November 2022
What Happened? Last month, the former Chief Information Security Officer (CISO) of a prominent ride-hailing and food delivery organization was found guilty by a federal jury of an attempt to cover up a cybersecurity attack faced by the organization a couple of years ago. What’s different here from previous similar legal cases is that for the first time a guilty verdict makes the person (in this case the CISO) personally liable, not for the security breach itself, but for attempting to cover...

Mobile Threat Defense
Blog | Expert's view · 11. July 2022
Spoiler: Downloading apps is a risky way You may have heard about the dangers of clicking suspicious email links or entering personal information on inappropriate websites But did you know that, despite this, you are unknowingly taking hidden security risks?

Demystifying Security: Threat Detection, Prevention, and Response (EPP, EDR, and MTD)
Blog | Endpoint Protection · 05. April 2022
In a previous article, we covered Mobile Threat Defense (MTD) solutions, offering threat detection, prevention, and response on mobile devices. Today we will cover similar functions but in more traditional desktop devices like workstations, laptops, and servers. Although the goal is similar, due to its own idiosyncrasies, the response is delivered in a different manner, with two different solutions providing a combined response: Endpoint Protection Platform (EPP) and Endpoint detection and...

Everyday Security Risks: USB
02. February 2021
Initially introduced on computers as a replacement for LPT, PS/2, or serial ports (e.g., printers, scanners, mouses), USB ports and USB devices have now been part of our life for more than 25 years already. They are the standard when it comes to charging mobile and portable devices; we can find USB charging port/station pretty much anywhere, from a Starbucks to an airport.

GDPR - Krankenhauszukunftsgesetz
27. January 2021
Microsoft Teams is prone to the same phishing hazards, impersonation scams and privacy violations as email is, yet many users naïvely treat this and other workplace communications platforms with inherent trust. As a result, they often share sensitive information too freely or click links and open attachments that in an email they might ignore, warns a new report.

Security Breach
21. January 2021
Vodafone postponed the eleVation Digital Days to April 27-29, 2021 due to the new lockdown in Germany.

End of Microsoft Windows 7
20. January 2021
Der Spiegel* und das Handelsblatt* berichteten zuletzt, dass noch Millionen von Microsoft® Windows® 7 Rechnern betrieben werden und auch heute noch in Deutschland über 4 Millionen PCs mit Windows 7 im Einsatz sind, obwohl es gefährliche Sicherheitslücken gibt.

Security Breach
19. January 2021
Almost a month has passed since an industry leader announced that their network and product had been compromised by a highly sophisticated state-sponsored adversary (see our previous article). In the meantime, a lot has been discovered as to how the attack was perpetrated. Attackers managed to inject malicious code into the software security updates that are automatically and without question pushed to every customer using their software. The update came from the vendor update servers, was...

ISEC7 SPHERE
02. November 2020
As more people are working remotely, sustaining normal levels of security and productivity has become a top priority for the organizations that employ them.