CyberInsights:
The blog about your IT security

CyberInsights

Find out about the most important developments in the field of cyber security and
IT risk management to successfully shape the digital transformation of your company.

Filter categories

Current articles in the area
CyberInsights

  • 14.10.2021Company

    What does a penetration test cost?

    Penetration tests, also known as pentests, are an important part of any security strategy and should be performed regularly in companies and institutions to check the IT security status. Most decision-makers and IT experts are well aware of this by now. But how much does a pentest actually cost and why is it always worth …

    Weiterlesen …

  • 17.05.2021Insights

    Darknet: Hidden on the net

    We hear many adventurous stories about the Darknet. It seems to be the dark counterpart to the Internet we know and use every day for work, education and leisure. In the hidden corners of the Darknet, criminals are said to have marketplaces offering all kinds of illegal and dangerous goods: Drugs, weapons, malware, even contract …

    Weiterlesen …

  • 12.03.2021Practical

    Outlook Exchange hack: How to protect yourself as a user

    Hundreds of thousands of organizations worldwide running Microsoft Exchange email servers have been hacked and infected en masse. Each hacked server was retrofitted with a web shell backdoor that gives the bad guys total remote control, the ability to read all emails, and easy access to the victim’s other computers. Security experts around the world …

    Weiterlesen …

  • 07.08.2020Insights

    Phishing: The most popular scam of cybercriminals

    The methods used by cybercriminals are becoming more and more advanced and are causing more damage to victims every year. One well-known and increasingly popular method used by attackers is phishing. This cybercrime scam is also constantly evolving and now uses particularly sophisticated tactics. In this article, we explain what is commonly understood by phishing …

    Weiterlesen …

  • 31.07.2020Insights

    Data theft: Lucrative business for hackers

    Hardly a day goes by without a confidential data leak dominating the headlines. Data leaks, also known as data theft, are a huge problem for data security, and the damage done to any business, regardless of size or industry, can be severe. From declining sales to a damaged reputation or massive financial penalties to crippling …

    Weiterlesen …

  • 16.07.2020Practical

    Hands-on tips for safe use of social media

    Social media applications have long since become a marketing tool for companies that they use to contact their customers and present their products. However, their use requires an increased awareness of security. Especially since white-collar criminals are now also trying to obtain valuable information via social networks. What’s more, many companies actively encourage their employees …

    Weiterlesen …

Follow us on

Do you want to minimize the risks of your digital transformation?

Please get in touch with us.