Dangerous Shadow IT | Pentest7
If employees use their own software without the knowledge of the IT department, shadow IT is created. Nadine Riederer, CEO...
If employees use their own software without the knowledge of the IT department, shadow IT is created. Nadine Riederer, CEO...
Passwords are still the most commonly used authentication method. In a guest article, Benjamin Richter, Managing Director of digital compliant...
The Ukraine crisis has made it clear that cyber warfare has long been a reality. Richard Werner, Business Consultant at...
The blockchain, decentralized technologies, DeFi, smart contracts, the concept of a “metaverse” and Web3 – the decentralized foundation built on...
Cyber criminals primarily imitate automated messages sent by LinkedIn. They are intended to trick users into entering their access data...
In the past few months, a number of administrations and companies have fallen victim to digital attacks. Many of the...
It is psychologically easy to explain why many employees use the same password for different accounts. Unfortunately, this creates significant...
Because cyber attacks are becoming more and more sophisticated, classic security measures such as multi-factor authentication or antivirus programs are...
In 2022 there are increasing dangers for small and medium-sized businesses, compounded by growing shared economy structures among cybercriminals. Smaller...
ISO certificates are important for compliance audits and cyber insurance. However, companies should not lull themselves into a false sense...