Blog.

Cyber security

Social Engineering - The hacking of people!

Most people have heard the term "social engineering" before. But very few people have a concrete idea of what it means. We provide insights!

Read more
CompanyCyber security

The Zero Trust Model - What is it and is it suitable for SMEs?

Everyone is talking about the Zero Trust model as an IT security concept. But what does it mean in detail? And can small and medium-sized enterprises…

Read more
Data protectionCyber security

Zero click attacks - No click and still the victim

Cyber risk is constantly on the rise. Cyberattacks have become so sophisticated that users can become victims without having taken action themselves…

Read more
Data protectionCyber security

Cybersecurity on Vacation

These days, smartphones, tablets and laptops are the most essential luggage items. Cyber criminals also know this and like to exploit it. So…

Read more
[Translate to English:] Gefahrenwarnung zur Schadsoftware TeaBot, die Android-Nutzer angreift
Data protectionCyber security

TeaBot malware tries to spy on banking data on Android devices

By downloading infected Android apps, users fall into the sights of cybercriminals. German users are also affected. With the help of the malware…

Read more
Data protectionCyber security

(Data) Scraping - Your data is my data

We are currently reading more and more about data scraping incidents at Facebook, LinkedIn and Clubhouse. But what exactly does this data collection…

Read more

Any questions?
We are here for you.

Arrange a free consultation with our IT security experts. We look forward to meeting you.

+49 030/95 999 80 80 (Mon - Fri 09:00am - 6:00pm)