All articles at a glance.

Filter by:
IT Solutions
Clear all filters
247 matches

Virtual and augmented reality can support us in virtual collaboration, training, and courses. Transform your office into a design studio or production hall. Design data for vehicles, machines, or buildings can be virtually edited, constructed, and modified together. On-site problems can be supported by experts on the computer with the aid of chats, documents, languages, and live videos—wherever you are. Employees can fully concentrate on the tasks they have to accomplish. Something that sounds complex and elaborate can also work for your company. Learn how in this blog.

With the increase of digitalisation, flexible working hours and international projects, and the Corona pandemic driving them all, traditional office work as we know it is increasingly being replaced by virtual workforces. Contrary to popular belief, these too require leadership.

Collaboration tools such as Microsoft Teams and Cisco Webex have come out on top, but there is a dark side—an increased compliance risk. And that doesn’t only mean in terms of the right licensing ...

The most recent victim was the Chamber of Commerce and Industry, which was hit by a suspected DDoS attack. Attacks like these can damage reputations and have financial repercussions, and in the worst case, hackers can get their hands on important corporate and customer data.

PAM is a secure and very flexible way to manage highly granular access rights

An increasing number of cyber-attacks are happening from predators hacking privileged accounts such as system administrators, allowing them to gain access to particularly sensitive information. Effective defence comes in the form of Privileged Access Management (PAM).

System admins are faced with a plethora of challenges when monitoring large IT infrastructures. The infrastructure is often distributed across several locations, they have hundreds even thousands of devices to keep an eye on and, generally speaking, several monitoring solutions and hardware from a range of manufacturers are in use. How can admins keep ahead of the game?

German SMEs have long been top targets for cyber-attacks and with good reason. From an attacker’s point of view, the obstacles put in their path are easy to circumvent and successful attacks tend to be uncovered when it’s far too late. Another point is that the damage that can be inflicted on these businesses is comparatively big which is illustrated, for example, by the large ransom that is demanded in the course of an attack. This means that attacks receive big pay-outs for minimal effort.

As part of its Achilles investigation, Check Point has uncovered over 400 vulnerabilities in Qualcomm’s Snapdragon DSP chip, affecting around 40% of the mobile phones used globally and making them vulnerable to attack.

Digitalisation, mobile working, flexibility, cloud computing—buzzwords we are all very familiar with these days. Despite that, many companies are battling to keep up with the changes, not only in terms of corporate culture and modern working styles, but also with respect to IT infrastructure.

F5 Networks has announced a critical vulnerability in security systems that are frequently used by customers in the DMZ. Successful exploitation of this vulnerability enables attackers to run arbitrary code with administrator rights on the target system. The code is simply sent as a specially formatted query to the Traffic Management User Interface without the need for any previous authentication.

Data protection and information security have always been related, but the introduction of the GDPR means they are now inextricably linked. What aspects need to be considered by companies? What concrete steps should companies now take in order to increase their IT security and data protection levels?

Check Point has discovered a critical vulnerability in all Microsoft Windows DNS servers. In the worst case, an external attacker can gain access to the entire corporate network (Active Directory) through Internet Explorer thanks to a user’s click. All Windows DNS Server versions from 2003 and later are affected and Microsoft has already made a patch available.

The number of security breaches registered daily has been giving IT admins a headache ever since we entered the age of digital transformation. Over the last few years, there have been plenty of stories of data being stolen and businesses being blackmailed and it’s not easy to shake the feeling of uneasiness and helplessness. But why? And what can we do to fight this feeling? These are the questions I’ll be tackling in this blog today.

Phishing e-mails pose the greatest threat to businesses today with over 90% of all attacks on IT infrastructure coming off the back of one. It’s crucial that it is as difficult as possible for criminals to succeed in this way, both for your company as a whole and your reputation.

What a few weeks ago was considered completely unthinkable has become the new normal with employees being forced overnight to work from home as a result of the coronavirus pandemic. Staff have to juggle work and family and businesses had to rethink their IT strategies and fast.

The times where classic backups were enough to keep your data protected are over. The rapidly growing complexity of IT systems and the exploding amounts of data make storage and protection of IT workloads costly and complicated—and complicated often means neither well protected or secure.

For many companies, security in the cloud still comes with many misconceptions attached. European organisations, in particular, worry that storing their data on a third-party system equals giving that party complete control over it. But is that really so? What are some things that companies should think of when it comes to keeping their assets protected in the cloud? One thing is for sure: When you’re planning to migrate into the cloud, you need to bake security in to your plan from the start.

The digital transformation is presenting your business with great opportunities, but also increasing your IT landscape’s complexity and vulnerabilities. The aim of a GAP security analysis is to systematically comb through your network and security infrastructure. Structured IT security analyses leverage risk analysis and recommendations for action to show you the technically and economically best path to success.

Traditional network infrastructures were always planned with a focus on connectivity rather than on securing users and the underlying IT. When it comes to security, is such an approach still acceptable today and what do lack of visibility, insufficient control and poor transparency in the corporate network mean? I’ll cover the answers to these question and other technical aspects of a secure network design in this blog.

If you’ve been following the IT labour market for the past years, you will have noticed that Germany is lacking experts in the IT sector. Well-trained and experienced specialists in network and security. and databases and cloud technology are extremely rare. Plenty of CIOs are desperate to find the right IT professionals to strengthen their IT organisation and spearhead their digitalisation projects. But what do you do if there are none? This blog will address this issue while providing ideas and measures to solve it.