Sunburst and Supernova in cyberspace – We support you.
The cyberattacks on companies FireEye, SolarWinds and Microsoft at the beginning of December 2020 have led to an overflow of reports on the events. Little by little, the effects are becoming known to the public, while further attacks are almost certainly to be expected. For this reason, we would like to give you an overview of this topic as well as recommend a plan of action.
07Dec
Network-based video monitoring in healthcare—validated and from a single source.
High occupancy and staff shortages are increasingly causing issues in healthcare, and not only because of the current situation. How can healthcare professionals protect their own health while taking care of patients? And how do they make sure that medication and equipment are safe and secure? And how do you keep patients entertained, safely and in compliance with the EU GDPR? Read on to find out!
07Dec
The weak link – Increasing employee awareness of malware.
Companies are increasingly being targeted by sophisticated phishing attacks during which users receive legitimate looking e-mails or end up on authentic looking websites and are persuaded to hand over access data or other sensitive information, thus opening the corporate network up to the risk of attack. The result? Encrypted data and a ransom demand.
03Dec
A shortage of experts – Are managed services the solution?
If you’ve been following the IT labour market for the past years, you will have noticed that Germany is lacking experts in the IT sector. Well-trained and experienced specialists in network and security. and databases and cloud technology are extremely rare. Plenty of CIOs are desperate to find the right IT professionals to strengthen their IT organisation and spearhead their digitalisation projects. But what do you do if there are none? This blog will address this issue while providing ideas and measures to solve it.
24Nov
Flat networks – A playground for potential hackers.
Traditional network infrastructures were always planned with a focus on connectivity rather than on securing users and the underlying IT. When it comes to security, is such an approach still acceptable today and what do lack of visibility, insufficient control and poor transparency in the corporate network mean? I’ll cover the answers to these question and other technical aspects of a secure network design in this blog.
19Nov
BIMI – IT security and brand protection in one.
Phishing e-mails pose the greatest threat to businesses today with over 90% of all attacks on IT infrastructure coming off the back of one. It’s crucial that it is as difficult as possible for criminals to succeed in this way, both for your company as a whole and your reputation. BIMI is the latest way you can protect your brand, giving your customers the peace of mind that the e-mails they receive really are from you, by placing your logo directly next to your e-mail in customers’ inboxes. Read on to find out how BIMI works and you can benefit.
16Nov
The IT security GAP analysis – Blessing or curse?
The digital transformation is presenting your business with great opportunities, but also increasing your IT landscape’s complexity and vulnerabilities. The aim of a GAP security analysis is to systematically comb through your network and security infrastructure. Structured IT security analyses leverage risk analysis and recommendations for action to show you the technically and economically best path to success.
05Nov
Cloud security – Why you can’t afford gaps in your strategy.
For many companies, security in the cloud still comes with many misconceptions attached. European organisations, in particular, worry that storing their data on a third-party system equals giving that party complete control over it. But is that really so? What are some things that companies should think of when it comes to keeping their assets protected in the cloud? One thing is for sure: When you’re planning to migrate into the cloud, you need to bake security in to your plan from the start.
04Nov
Information Security Policy – Set up policies and boost information security.
The number of security breaches registered daily has been giving IT admins a headache ever since we entered the age of digital transformation. Over the last few years, there have been plenty of stories of data being stolen and businesses being blackmailed and it’s not easy to shake the feeling of uneasiness and helplessness. But why? And what can we do to fight this feeling? These are the questions I’ll be tackling in this blog today.
30Oct
In the age of the cloud, how is the perimeter changing?
Digitalisation, mobile working, flexibility, cloud computing—buzzwords we are all very familiar with these days. Despite that, many companies are battling to keep up with the changes, not only in terms of corporate culture and modern working styles, but also with respect to IT infrastructure.
22Oct
Data centre security – Welcome to the next generation.
Data centres are at the heart of any business. We’ve spent many years working with server, network and storage systems that make working in a digitalised world possible. Businesses are striving to make better use of their IT resources and ready them for the future with the latest and best security technologies to reconcile them with their own cloud transformation.
State Survey Office - Optimum transparency and reduced administrative expenditure thanks to successful introduction of central, IT-based inventories. Learn more.
Comprehensive data protection: the data protection and information security concept implemented by Bechtle ensures that Sigloch satisfies all the legal requirements. Learn more.
Die HassiaGruppe implementiert mithilfe von Bechtle Office 365 und kann damit effizienter auf zukünftige IT-Anforderungen reagieren und gleichzeitig Kosten sparen. Erfahren Sie mehr.
Bechtle successfully coordinated the project for the pan-European rollout of the new Windows 8.1. operating system and applications for Frankonia Handels GmbH. Learn more.