New and more treacherous methods of ransomware attacks: intermittent encryption and how you can reliably protect yourself from it

The most frequently used gateway for cyber-attacks is still e-mail. That is where a never-ending technological battle between attackers and defenders is taking place. But despite big efforts by experts and ever greater investments by companies, the cyber criminals always seem to stay one step ahead. And they succeed [...]

By |2022-11-30T11:56:21+00:00November 30, 2022|blog, Email Security, Malware Protection|0 Comments

Do you have what is needed for a successful implementation of DLP technology?

Information security relates to dataThe proper use and protection of information lies at the core of the entire information and cybersecurity domain. And information is generated when working with data. It is therefore quite clear that everything in the information security domain relates to data. But data is not [...]

By |2023-11-23T16:04:04+00:00October 13, 2022|blog, Data Loss Prevention, Data Protection|0 Comments

Encryption of documents in MS Teams, Part 2: Sensitivity labels

Sensitive files in Teams need to be encrypted As we mentioned in the first part of our mini encryption series, over 25% of documents stored and exchanged in the cloud contain sensitive data. Encryption is often used in such cases to prevent confidential files from being accidentally destroyed in Teams [...]

By |2022-11-02T14:18:49+00:00September 18, 2022|blog, Collaboration EN, Data Protection, Document Encryption|0 Comments

Encryption of documents in MS Teams: Part 1 – Types of encryption

How safe are collaboration platforms? Over 25% of company data is confidential and needs to be protected We all know the general rule that any information that is created, transmitted or stored is potentially at risk. Therefore, most security topics in the IT sector address the protection of [...]

Does Cyber Insurance protect your business and how do you prepare for it?

What does Cyber Insurance protect you from? Cyberattacks affect businesses of all sizes and even protected businesses fall victim In times when an attack by cyber criminals is not a question of “if” but of “when and how hard” it will hit (you), companies are putting all their [...]

By |2022-11-02T14:22:35+00:00June 8, 2022|blog, Collaboration EN, Email Security|0 Comments

Germany – a prime target for cybercriminals, with a medium level of security

How resilient are German companies to cyber threats? Almost 92% of organisations have experienced cyber attacks Hardly anyone who has read the recent cyber security headlines has any doubt that ransomware is the biggest malware threat at the moment. And Germany seems to be one of the main [...]

By |2024-01-08T09:15:17+00:00April 20, 2022|blog, Collaboration EN, Email Security|0 Comments

5 ways the four-eyes principle protects your sensitive data

The power of double-checking with four-eyes principle Ensures high level of security and transparent accountability Every organization needs to protect its data, particularly the sensitive information that greatly affects its performance, image and profit. It is not only inbound email threats such as spam and malware that compromise [...]

Top Cybersecurity Threats for 2022 – An Outlook

What threats will carry over from 2021 to 2022? A lot of trends from 2021 will continue in 2022 Those who believed that spending a good deal of money on the latest security software would ensure their company was fully protected from future cyberattacks have surely already realized [...]

By |2022-11-02T14:23:55+00:00January 10, 2022|blog, Collaboration EN, Email Security|0 Comments

Log4j – one of the most dangerous vulnerabilities in the last few years!

Log4j allows access to server iQ.Suite is not vulnerable Log4j has become interestingly popular in the last several days, unfortunately for the wrong reasons. On the 9th of December, a critical vulnerability was discovered in Apache configurations using the Log4j library – CVE-2021-44228. This vulnerability scores 10 out [...]

By |2024-01-08T09:06:50+00:00December 16, 2021|blog, Email Security|0 Comments

Demystifying DLP – a concept that loves rules

Why does DLP fail to become a security standard? The DLP concept suggests that data flow should be monitored and controlled The Concept DLP (Data Loss Prevention)– a term that has been around for more than 15 years, but still fails to establish itself as a proven and trustworthy [...]

By |2024-01-08T09:21:26+00:00December 8, 2021|blog, Data Loss Prevention, Data Protection|0 Comments
Go to Top