BLOG

2 min read

In 6 Schritten zu mehr IT Sicherheit mit Zero Trust

By Andreas Fuchs on Jan 14, 2020 2:49:04 PM

Bildquelle: iStock

Das große strategische Ziel von Cybersicherheit im digitalen Zeitalter ist die Bekämpfung und Eindämmung von Datenschutzverletzungen. Die Daten eines Unternehmens sind sein höchstes Gut, das es zu schützen gilt.

Im letzten Blog-Post "Zero Trust - so funktioniert IT Sicherheit heute: Kontrolle statt Vertrauen" haben wir darüber gesprochen, was Zero Trust ist. In diesem Beitrag erklären wir Ihnen, wie Sie schrittweise Zero Trust im Unternehmen umsetzen.

weiterlesen
4 min read

3 Data Encryption Facts Your Business Needs To Know

By Alma Pranoto on Dec 6, 2018 10:25:20 AM

By Alma Pranoto

1. THE SHOCKING STATISTICS OF DATA BREACH

According to the IBM 2018 Cost of a Data Breach Study it costs $3.86 million US to cover an average data breach. This cost will increase by 6.4% per year and the likelihood of a recurring breach over the next two years is 27.9%.

weiterlesen
5 min read

Time to stop USB drive horror stories!

By Mohamad Ashokaibi on Jun 19, 2018 10:19:00 AM

DEvice
                                                                                                     Picture by Antonio Guillem | iStock

by Mohamad Ashokaibi

  • CFO: “I've lost my USB thumb drive. Lots of important spreadsheets were there! Do something please!”

  • Project Manager: “I’ve just used my USB external drive on a contractor’s laptop who said he never had an AV. Can I use it safely on the company’s laptop again?”

  • Sales Lady: “Remember the USB drive the company has given me? Seems I dropped it in that taxi yesterday while on my way home. Could I ever know what I backed up on it before leaving the office?”

  • Engineering Team Lead: “Since my colleague checked her SD card on my PC this morning I don’t seem to be able to open my project documents anymore. They all are unreadable. What could it be?”

  • Risk Management Head: “We have a new requirement; all USB storage devices must be blocked inside our corporate network, except company-provided sticks which must be encrypted before use. Can we do that?”

weiterlesen

weitere News