How to recognise and remove malware

Practically every PC user fears Trojan horses and computer viruses. Security is paramount if you are managing sensitive data or setting up a server. You need a comprehensive security concept to protect yourself against insidious malware. It’s helpful to know the different types…

Read more

What is an SQL injection?

It seems like almost every day a new software vulnerability is uncovered or an existing one is patched. One attack method that has long exploited such weaknesses is the SQL injection. But what exactly are these malicious database exploits, how do they work, and—most…

Read more

What is TLS (Transport Layer Security)? The protocol explained

Internet security measures have become indispensable these days. Encryption is essential to ensure that unauthorised third parties do not gain access to data or are able to manipulate it. That’s what TLS or Transport Layer Security is for. Here’s what you need to know about this…

Read more

What is SIEM (Security Information & Event Management)?

With timely warnings, cyber threats can be reliably identified and averted. The question is where to get the data from and how to draw the right conclusions. This is where SIEM, short for Security Information & Event Management, comes into play. Any suspicious incidents and…

Read more

What is an intrusion detection system (IDS)?

An intrusion detection system (IDS) begins its operation at the host, the network, or both, actively examining records in real-time to identify any discernible anomalies. When irregularities are detected, the system promptly sends an alert to the relevant parties, playing a…

Read more

What is an intrusion prevention system?

In addition to a firewall, an intrusion prevention system (IPS) can monitor either an individual end device or an entire network and alert about potential threats. Unlike intrusion detection systems (IDS) with a similar design, IPS takes a more proactive approach by actively…

Read more

What is tailgating and how to protect your company

While many companies focus on protecting themselves against digital attacks, it’s important not to underestimate the importance of physical security. Tailgating is one such threat. While not based on the latest technology, it still poses a significant danger. We’ll take a look at…

Read more

What is skimming fraud and how to protect yourself

Skimming happens when criminals tamper with cash machines in order to read information from credit or debit cards that have been placed in them. Although there have been major improvements in security, this type of fraud poses a real danger when withdrawing money and making…

Read more

What is endpoint security? How to protect your devices

Company networks should be super secure, yet due to the many endpoint and mobile devices, they sometimes exhibit numerous unexpected security flaws. Endpoint security offers both technical solutions and security management practices to address these vulnerabilities. We outline…

Read more