Demystifying DLP – a concept that loves rules

Why does DLP fail to become a security standard? The DLP concept suggests that data flow should be monitored and controlled The Concept DLP (Data Loss Prevention)– a term that has been around for more than 15 years, but still fails to establish itself as a proven and trustworthy [...]

By |2024-01-08T09:21:26+00:00December 8, 2021|blog, Data Loss Prevention, Data Protection|0 Comments

Emotet strikes again

Computers infected with TrickBot are at risk The German Federal Criminal Police Office (BKA) calls it the “most dangerous malware in the world” Not even a year has passed since Emotet was officially shut down by authorities in January 2021, when security researcher Brad Duncan reported its return. [...]

By |2024-01-08T09:13:29+00:00November 25, 2021|blog, Email Security|0 Comments

Online discussion “Email Encryption with S/MIME and PGP” with our security expert Dr. Rolf Kremer

Host of the discussion is the Tuesday Afternoon Club, dedicated to algorithmic challenges. DIGITALL has the pleasure to invite you to the online discussion “Email Encryption with S/MIME and PGP” presented by the cyber security expert Dr. Rolf Kremer, VP R&D of GBS Europa, which is part of [...]

By |2022-09-18T16:14:02+00:00November 24, 2021|blog, Encryption|0 Comments

Security incident: Sending sensitive data to the wrong recipient

An incident that happens more often than we realize 90% of employee communication takes place via email making it the main channel for a data leaks When we talk about cybersecurity, we often think only in terms of defense. We believe that we have something in the digital [...]

By |2024-01-08T09:19:22+00:00November 8, 2021|blog, Data Protection|0 Comments

Business Email Compromise – the most expensive email attack

BEC is much more dangerous and costly than phishing BEC is mostly used for invoice or payment fraud Business Email Compromise (BEC) is yet another attack tactic that has been on the rise in the last several years. According to different studies and researchers (e.g. FBI Crime Complaint [...]

Supply Chain Attacks on the rise

Enterprise Security Practices for Exchange and Office365 Our level of protection is as good as that of our partners and suppliers The last couple of years, and especially 2021, have been marked by several huge attacks on service providers and vendors. Some of the most notable ones are the attacks [...]

By |2022-11-02T15:29:11+00:00October 27, 2021|blog, Email Security, Supply Chain Attacks|0 Comments

Protection of collaboration platforms with iQ.Suite 360

Securing collaboration platforms with an innovative approach iQ.Suite 360 can overcome the limitations of Microsoft Defender In the previous part of our series on protection of collaboration platforms, we presented the functionalities integrated in Office 365 that Microsoft offers. In this article, we will reveal how the limitations of [...]

By |2024-01-08T09:35:39+00:00October 12, 2021|blog, Collaboration EN|0 Comments

Protection of collaboration platforms: Integrated functions in Office 365

Coverage of the standard Office 365 features Microsoft Defender for Office 365 offers good protection, however … In the first article of our series on protection of collaboration platforms, we outlined the importance of protecting platforms such as Office 365. In this part of the series, we will introduce [...]

By |2024-01-08T09:34:18+00:00September 9, 2021|blog, Collaboration EN|0 Comments

The New Challenge: Securing our Collaboration Platforms

The tough choice between simplicity and high security of collaboration platforms Built-in features provide limited control and visibility What is the most common attack mechanism used by cyber criminals? Yes, it is still malware! And what are the most used applications in our daily communication? Email, maybe, then come Zoom, Teams, [...]

By |2024-01-08T09:32:21+00:00March 19, 2021|blog, Collaboration EN|0 Comments

Simplifying Work with Container Technology

Container technology has made an impact “Significant advantages over virtual machines” Four years ago, we reported in one of our blog posts (in German only) about the evolution of virtualization through the use of container technology. In the meantime, container technology has made its way into many companies, [...]

By |2024-01-08T09:36:50+00:00March 9, 2021|blog|0 Comments
Go to Top