Data protectionCyber security

Zero click attacks - No click and still the victim

Cyber risk is constantly on the rise. Cyberattacks have become so sophisticated that users can become victims without having taken action themselves…

Read more
Data protectionCyber security

Cybersecurity on Vacation

These days, smartphones, tablets and laptops are the most essential luggage items. Cyber criminals also know this and like to exploit it. So…

Read more

Bring Your Own Device (BYOD) – Use of private devices in a professional context

With many IT devices, there is no clear separation between how you work with them at home and in the office. Work e-mails are quickly checked on the…

Read more

The "Silent Cyber" Risk - Silence is not always golden

Silent cyber describes a "silent" or also a so-called non-affirmative cyber risk. This means that coverage for damage resulting from a cyber attack is…

Read more

How to better protect your smartphone

Smartphones are of great interest to cybercriminals. After all, they play an important role in online banking and combine a lot of private data. It is…

Read more

Critical infrastructure increasingly targeted by cybercriminals

Last month brought several cyber security incidents that targeted critical infrastructure including health care institutions all over the world.…

Read more

Any questions?
We are here for you.

Arrange a free consultation with our IT security experts. We look forward to meeting you.

+49 030/95 999 80 80 (Mon - Fri 09:00am - 6:00pm)