IT security today encompasses much more than an effective firewall. Security must be thought of holistically, especially since not a few attacks are made from the inside out. Our security experts blog here ...
Five C for cloud security.
This page is not currently available in the selected language.
The it-sa, Europe’s largest IT security fair opened its doors from 8 to 10 October in Nuremberg and Bechtle was there with a large selection of security specialists from all over Germany, from our business units and systems integrators. One Bechtle for our customers’ security.
Cyber resilience – Proactive preparation for tomorrow.
Reports about new cyber threats emerge nearly every day. Absolute security is impossible to achieve, but a proactive approach can help companies map out a way to protect their core business components against future threats. This is known as cyber resilience.
„DejaBlue“: More weak spots in Microsoft's Remote Desktop Protocol (RDP).
Only a few months after the discovery of CVE-2019-0708—BlueKeep—Microsoft released patches for four other weaknesses. As "BlueKeep” did before, the vulnerabilities called "DejaBlue" allow the execution of arbitrary code on vulnerable systems (CVE-2019-1181, CVE-2019-1182, CVE-2019-1222, CVE-2019-1226).
CERT-Bund, the computer emergency response team of the German Federal Office for Information Security (BSI), has issued a warning about a new type of ransomware that immediately deletes data instead of merely encrypting it. This means that even if the affected organisation pays the ransom, its data is gone forever. Read on to learn about GermanWiper and what you can do to protect yourself.
Security gaps in wireless Logitech keyboards and mice.
Several articles have come out in recent weeks reporting on security issues found in wireless Logitech keyboards and mice. Various Logitech presenters are also affected. The vulnerable devices communicate with their Unifying receivers on a 2.4 GHz frequency.