About Dimitar Sharkov

This author has not yet filled in any details.
So far Dimitar Sharkov has created 33 blog entries.

Does Cyber Insurance protect your business and how do you prepare for it?

What does Cyber Insurance protect you from? Cyberattacks affect businesses of all sizes and even protected businesses fall victim In times when an attack by cyber criminals is not a question of “if” but of “when and how hard” it will hit (you), companies are putting all their efforts into preventing potential threats. There [...]

Germany – a prime target for cybercriminals, with a medium level of security

How resilient are German companies to cyber threats? Almost 92% of organisations have experienced cyber attacks Hardly anyone who has read the recent cyber security headlines has any doubt that ransomware is the biggest malware threat at the moment. And Germany seems to be one of the main targets since 2015. Last year, it was [...]

5 ways the four-eyes principle protects your sensitive data

The power of double-checking with four-eyes principle Ensures high level of security and transparent accountability Every organization needs to protect its data, particularly the sensitive information that greatly affects its performance, image and profit. It is not only inbound email threats such as spam and malware that compromise data security, but also breaches of [...]

Top Cybersecurity Threats for 2022 – An Outlook

What threats will carry over from 2021 to 2022? A lot of trends from 2021 will continue in 2022 Those who believed that spending a good deal of money on the latest security software would ensure their company was fully protected from future cyberattacks have surely already realized their mistake. A look at the [...]

Log4j – one of the most dangerous vulnerabilities in the last few years!

Log4j allows access to server iQ.Suite is not vulnerable Log4j has become interestingly popular in the last several days, unfortunately for the wrong reasons. On the 9th of December, a critical vulnerability was discovered in Apache configurations using the Log4j library – CVE-2021-44228. This vulnerability scores 10 out of 10 in CVSS (Common Vulnerability [...]

Demystifying DLP – a concept that loves rules

Why does DLP fail to become a security standard? The DLP concept suggests that data flow should be monitored and controlled The Concept DLP (Data Loss Prevention)– a term that has been around for more than 15 years, but still fails to establish itself as a proven and trustworthy technology. Why is that? It all [...]

Emotet strikes again

Computers infected with TrickBot are at risk The German Federal Criminal Police Office (BKA) calls it the “most dangerous malware in the world” Not even a year has passed since Emotet was officially shut down by authorities in January 2021, when security researcher Brad Duncan reported its return. There are indications that as of [...]

Online discussion “Email Encryption with S/MIME and PGP” with our security expert Dr. Rolf Kremer

Host of the discussion is the Tuesday Afternoon Club, dedicated to algorithmic challenges. DIGITALL has the pleasure to invite you to the online discussion “Email Encryption with S/MIME and PGP” presented by the cyber security expert Dr. Rolf Kremer, VP R&D of GBS Europa, which is part of DIGITALL. The event is organized by [...]

Security incident: Sending sensitive data to the wrong recipient

An incident that happens more often than we realize 90% of employee communication takes place via email making it the main channel for a data leaks When we talk about cybersecurity, we often think only in terms of defense. We believe that we have something in the digital world that belongs to us and [...]

Business Email Compromise – the most expensive email attack

BEC is much more dangerous and costly than phishing BEC is mostly used for invoice or payment fraud Business Email Compromise (BEC) is yet another attack tactic that has been on the rise in the last several years. According to different studies and researchers (e.g. FBI Crime Complaint Center), BEC is one of the [...]

Go to Top