Our Blog

 

Security Concepts – The CIA Triad

Security Concepts – The CIA Triad

When it comes to security concepts, there are several measurements that one should keep in mind. The most common and primary goals of a security infrastructure are the goals of the CIA Triad. The CIA Triad is an information security model that is used to create a security policy. This model has a rich history, dating back to its use in 1998. The security of information does not only relate to cybersecurity but applies to scenarios such as filing and record storage as well. Figure 1: The CIA...

read more
What is Security Awareness?

What is Security Awareness?

Since 1990, the Internet has spread around the world with great speed and with it, cybercrime has grown at a continuously increasing rate. Thus, cyber security is getting more important. According to IBM, in 2022, a data breach cost on average 4.35 million US-Dollar.     What is the role of humans in cyber security?  One critical element of successful attacks is the human factor. According to a report by Verizon, in 82% of all breaches a human element is involved. Human elements include social...

read more
What are the Benefits of an Incident Response Plan for your company?

What are the Benefits of an Incident Response Plan for your company?

An incident is a security event that may result in damage to the organization’s data, systems or reputation. This can be caused by external attacks (e.g., hackers) or an internal attack (e.g., a disgruntled employee). In either case, the goal of Incident Response Cybersecurity is to identify and contain the threat before it causes any harm to an organization’s network and information assets. Some common types of incidents are: Technical incidents: These are caused by technical problems and...

read more
Are Quantum Computers a Threat for your Encryptions?

Are Quantum Computers a Threat for your Encryptions?

Researchers have already developed ways to decrypt encryption algorithms more efficiently than ever by using quantum computers. This raises one urgent question: when will quantum computers be powerful enough to threaten our current cryptographic landscape? What are quantum computers? Contrary to a normal computer, which can operate on only two signals (zero and one), a quantum computer can leverage quantum mechanics to increase the space of its computation. This allows for solving problems...

read more
Small and medium enterprises – A sleeping danger?

Small and medium enterprises – A sleeping danger?

SMEs are the backbone of the EU’s economy, yet risks and challenges from cyberspace are often underestimated, and resources are limited. Within this post, you will learn what challenges SMEs face in the cybersecurity world and how consulting can help clients to overcome these.   Why are SMEs especially vulnerable to cyber threats? SMEs are companies with less than 250 employees and less than an annual turnover of 50 million €. 99,4% of all registered companies in Germany s, with 56% of...

read more
Security Policies – What exactly are they?

Security Policies – What exactly are they?

For most organizations, maintaining security is an integral part of day-to-day business. Many organizations would fail if their security was seriously compromised.  To reduce the likelihood of security failures, the security implementation process has been formalized to some extent through a hierarchical organization of documentation. Each level focuses on a specific type or category of information and matter. To lay the foundation of a robust and reliable security infrastructure security...

read more
Zero Trust – trust no one?

Zero Trust – trust no one?

It seems like Zero Trust technology is the silver bullet to solve all security challenges in a corporate network. But what exactly is Zero Trust, why should it be used, and how does it protect the assets? First, Zero Trust is not technology at all. John Kindervag coined the term in 2010 when he described a way to optimize security architectures by getting away from the purely perimeter-based defense model. The perimeter-based model builds layered defenses - like multiple firewalls - around the...

read more
Secure the modern workplace!

Secure the modern workplace!

Why now? Working from home was once considered a luxury. It became a necessity, with individuals all around the world being quarantined due to the coronavirus. This is a game-changer not only for workers in the world's wealthiest countries (where the largest companies with the most lucrative positions tend to locate), but also for worldwide employment and, as a result, amplifying the social mobility in poorer countries. The additional freedom acquired by remote work revolutionizes the work...

read more
Social Media Monitoring: A Cybersecurity Approach

Social Media Monitoring: A Cybersecurity Approach

Social Media Monitoring is used in cybersecurity to detect and prevent threats from social media or other social interaction channels like forums or chatrooms. This should not be confused with social media intelligence which sounds similar but is an entirely different method used in marketing to analyze the behavior trends of individuals from social networking sites.  What is Social Media Monitoring? Today's criminals have also learned about the power of social media. Information about a user...

read more
API – the neglected IT vulnerability?

API – the neglected IT vulnerability?

A couple of years ago, almost every IT system was a dedicated standalone solution with only one purpose . Calculating the best path for the first NASA moon mission or creating a digital weather forecast for the first time in history. All those systems did not  need to communicate to other IT systems  because they combined all required capabilities in themselves. Unlike today where every system from the smartphone in our pocket to the ERP Systems of the biggest internationally acting companies...

read more

Want to get Secure?

Contact