Posts tagged with "ISEC7"



27. January 2022
Understanding the Log4j Vulnerability
On December 9th, 2021, a Log4j vulnerability was published and later to be designated CVE-2021-44228, and if exploited, it could allow hackers to remotely execute code on affected systems, an action called remote command execution.
18. January 2022
How to keep your data safe from Apache Log4j vulnerabilities
In December, the Apache Software Foundation quickly released information about two critical vulnerabilities in its Java-based Log4j library.
17. January 2022
Der TI Messenger (TIM)
Ab Sommer 2022 wird ein Standard für ein sicheres und interoperables Instant-Messaging im deutschen Gesundheitswesen eingeführt: Der TI (Telematikinfrastruktur) Messenger von gematik.
13. January 2022
X-ray of a Successful Small Medium Business (SMB) Digital Workplace Strategy
What is a digital workplace strategy? A comprehensive digital workplace strategy is more than just a collection of solutions that allow employees to work from anywhere, from any device, at any time. Your comprehensive digital workplace strategy must provide everyone with the right combination of tools, solution platforms and services, as well working methods to improve the work experience and foster collaboration, ultimately improving productivity and efficiency while always ensuring and...
08. December 2021
Business Messenger Trends 2022
Which business messenger are you using in your organization? Learn more about the six trends for business messaging innovation in 2022. The last two years have not only given a significant boost to the digital transformation of companies, but have also advanced internal communications in many places. To connect decentralized teams and mobile employees quickly and securely, new communication channels must be used. Here, DSGVO-compliant business messengers are clearly on the rise. Teamwire has...
30. November 2021
Demystifying Technology: Virtualization Beyond Servers
Virtualization is a well-proven technology used for decades by corporations to deploy servers internally using Virtual Machines (VM) and transparently provide services like corporate email, database, and other applications/services to their employees. The function is the same as if it were running on hardware-based servers, but with advantages like quicker provisioning and deployment, lower hardware costs, better resources distribution, portability, and migration, to name a few.
16. November 2021
The Year in Review, and Looking Forward to 2022
After an unconventional year like 2020, with an unexpected pandemic putting the whole world on a hold, 2021 was largely expected to be back to “business as usual” with employees returning to the office as vaccines became available and the threat of COVID dwindled.
08. November 2021
Jennlog Malicious Loader
A malicious loader named Jennlog has recently been used by an Iranian threat actor called Agrius in a ransomware attack against a university in Israel. The malware was written in .NET assembly language, and designed to target Windows® machines.
03. November 2021
Demystifying: Apple, Android for Enterprise, and Samsung Knox for Your Enterprise
It’s safe to say that in today’s world everyone has gone remote, with users accessing data online from different devices like smartphones, tablets, and laptops. In previous blog posts, we’ve discussed how UEM solutions are ideal when it comes to ensuring the security of data and devices that are operating remotely. However, Apple, Google, and Samsung also offer their own services and tools to help manage their devices and protect their data. Let’s break down their...
25. October 2021
How to prevent users from becoming Guests in an external Office 365 Tenant.
Microsoft Teams is without any doubt a key asset for corporate communications at this time. To improve collaboration, Microsoft offers the ability to add an external user as a guest in the external tenant. This increases productivity but on the other hand can pose new risks especially when your users are guests in other tenants and at that point are not subjected to the policies of your company. The guest option is actually a loophole in compliance and governance of a company that must be...

Show more