Roaming improves IT security for international travellers
Itsecurity placeholder

( Source: www.presseportal.de )
» Read more
KRITIS brings about improvements in the IT security of critical infrastructures
Itsecurity placeholder

( Source: www.it-daily.net )
» Read more
Study
Human Risk Factor – Potential Analysis Shows: Cyber Security Needs More IT Specialists and Greater Security Awareness
Thumb cybersecurity risks

In September 2018, Sopra Steria Consulting and the F.A.Z.-Institut conducted an online survey of 308 specialists and decision-makers from various industries. The survey focused on experiences, measures and challenges relating to IT strategies and cyber attacks in the company itself. The result shows: There is still too much carelessness in dealing with cyber security. Conversely, companies with a high level of security awareness suffer from a shortage of skilled personnel in their search for suitable specialists. An increase in security budgets is on the agenda for most companies. 

...

» Read more
Study
Deloitte Cyber Security Report 2018: A deceptive feeling of security
Thumb cybersecurity report

Most mistakes happen when people lull themselves into safety. Cyber security in particular proves that perceived security and weakening security measures are an invitation to attacks. A recent survey by Deloitte confirms that digitization is not a safe business. Half of the companies surveyed for the Deloitte Cyber Security Report 2018 stated that they are confronted with attacks daily or several times a week. At the same time, the perceived frequency of hacker attacks on companies is countered by a decreasing risk awareness among top managers. 

 

Cyber attacks...

» Read more
Study
How companies protect themselves: These are the 5 most popular antivirus programs
Thumb popular antivirus programs

There are many solutions against cyber threats on the market, but companies are mainly interested in one. This is shown by a recent flash study by itsecurity-xpert.com in cooperation with the digital marketing suite selfcampaign. From January to October 2018, the team analyzed the most popular articles on anti-virus solutions on affiliated partner websites. The result should surprise many specialists.

 

Five companies but only one winner

The result of the study knows a clear winner, four second placed and the one or another question mark. With 20% of all relevant article readers for...

» Read more
Study
IT Security 2018: These were the 3 big concerns of IT managers
Thumb sorgen it verantwortliche

Thinking of the IT security incidents of 2018, threats like Spectre, Coinhive and Scarab come to mind. These were events that were covered by the media and attracted widespread attention. And they were examples that made it clear that IT security in companies is more relevant than ever before. But do these incidents also reflect the issues that most interest IT decision-makers? An exclusive flash study by itsecurity-xpert.com now provides insightful answers. In cooperation with the B2B platform selfcampaign, we have scrutinised the online behaviour of IT decision-makers. The study is based...

» Read more
Inside Story
The Most Stubborn Myths About Email Encryption
Thumb totemo e mail verschluesselung

Email encryption is an important way to protect sensitive data. However, many companies still do without it. They find the technology too expensive, too complicated, or even unnecessary. It's high time to get rid of these stubborn myths.

Email encryption? – I don't need it! This may be what some small or medium-sized companies think. What do I have to hide? Who argues in such a way, goes into dangerous terrain. Because in fact it is legally prescribed to encrypt e-mails with personal data - and not only since the new EU data protection basic regulation. This was...

» Read more
Study
DigiCert Survey: The Corporate Losses Associated With the IoT Security
Thumb iot security

The Internet of Things is currently ramping up, with 92% of companies indicating that it will be essential in the next two or three years. Organisations that are not prioritising the security for their Internet of Things deployments may encounter significant losses upwards of hundreds of millions of dollars.

The current state of the Internet of Things Security Survey by the DigiCert company explores common practices and security behaviours among the best firms. Here are the main findings of the survey. 

 

Main Findings 

The recent study from the DigiCert, Inc., which is a...

» Read more
Trend
What Is DevSecOps?
Thumb devsecops

DevSecOps means "development, security and operations", and is the idea that everybody involved in the process of software development is also responsible for its security. With the increased reliance on computing technology in a rapidly changing world, businesses and their customers alike need to be confident that their data is being kept secure. By incorporating security processes into the development stages, instead of leaving it until the end, the necessary checks can be embedded, and many can also be automated. 

 

Why switch to DevSecOps? 

Traditionally, a...

» Read more
Practical Advice
Identification and Prevention of Phishing
Thumb phishing

Phishing is a modern-day online fraud that involves sending of suspicious messages, mostly using emails, to unsuspecting people requesting for sensitive information. The information usually requested are usernames, passwords for financial or other personal details. The common narrative used is detail verification with threats of terminating the service if the data requested is not provided. 

 

Common Signs for Phishing Attempts 


  1. Spelling and Grammar used in an email are the first signs of phishing. In case the meaning or structure of a sentence is incoherent, do not open any...

» Read more