Der globale Passwort-Sicherheitsreport 2018

Thumb original iam lastpass sotp ebook final de

Passwörter stellen schon lange eine Herausforderung für die Cybersicherheit am Arbeitsplatz dar. Die Anzahl und Komplexität der Angriffe nimmt jedes Jahr zu. Trotz dieser Bedrohungen haben Unternehmen immer noch Schwierigkeiten, ihr eigenes Risiko in Bezug auf die Passwortsicherheit einzustufen. Sie wissen nicht, wie effektiv ihre Richtlinien sind. Sie haben keinen Einblick in das Verhalten ihrer Mitarbeiter. Und sie können nicht überprüfen, wie sie im Vergleich mit anderen Unternehmen ähnlicher Größe, Branche oder Lage abschneiden.

Das hat nun ein Ende. In diesem Report decken wir nicht nur tatsächliche Passwortgewohnheiten am Arbeitsplatz auf, sondern schaffen darüber hinaus eine Benchmark, mit deren Hilfe Unternehmen, die in Passwortsicherheit investieren, ihren Erfolg messbar machen können. Anhand von Durchschnittswerten großer und kleiner Firmen möchten wir IT-Sicherheitsexperten aufzeigen, wo sich ihr Business einreiht und wie sie die Passwortsicherheit ihres Unternehmens verbessern können.

View whitepaper
Date: 14 June 2019, 0:00 am   |   Provider: LogMeIn Germany GmbH   |   Size: 3.41 MB   |   Language: German
This may interest you too:
Thumb original idr infographic automation is essential for cyber resilience final july 2019  1

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To the download
Thumb original malwarebytes cybercrime tactics and techniques

Cybercrime tactics and techniques: Q2 2018

A generally slow quarter reflects an overall lullin cybercrime, picking up where Q1 left off with cryptominers continuing to dominate, ransomware continuing to evolve through experimentation, and exploits making a small but significant comeback.

New developments in ransomware and cryptomining drove the market, as Q2 attacks generally showed more sophistication than their Q1 counterparts. The introduction of complex VPNFilter malware, which dropped multi-stage attacks on hundreds of thousands of unsuspecting small office and consumer users, ...

To the download
Thumb original idr infographic automation is essential for cyber resilience final july 2019

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To the download
Thumb original forrestertei cylanceprotectandcylanceoptics  1

The Total Economic Impact™ Of CylancePROTECT® And CylanceOPTICS™

Employee endpoints are the interfaces between employees and the corporate data and applications they need to do their jobs. Attackers understand this — and actively target employee endpoints as well as the server endpoints hosting corporate data. More than 50% of companies experience a significant data breach each year, and endpoints, as a critical conduit for valuable corporate data, are the top targets for attack. Endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. ...

To the download
Thumb original new edr capes sb d

AI-Driven Threat and Incident Prevention, Detection, and Response

Traditional cybersecurity approaches suffer from two glaring weaknesses. First, they rely on the digital signatures of known malware in order to identify threats. This approach leaves systems vulnerable to new and non-catalogued malware. Second, they are reactive in nature, ascribing to the “it’s not a matter of if, but when” mentality and often responding to the damage caused by zero-day threats only after they execute. Guarding against known threats is important but in the modern threat, landscape organizations must also address the over 350, ...

To the download