By Talos Group This post was authored by Edmund Brumaghin Summary Tofsee is multi-purpose malware that has been in existence for several years, operating since at least 2013. It features a number of modules that are used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Once infected, systems become […]

Source:: Cisco Security Notice

By Talos Group This post was authored by Edmund Brumaghin Summary Tofsee is multi-purpose malware that has been in existence for several years, operating since at least 2013. It features a number of modules that are used to carry out various activities such as sending spam messages, conducting click fraud, mining cryptocurrency, and more. Once infected, systems become […]

Source:: Cisco Security Notice

By Tobias Mayer Sometimes having a effective and innovative solution goes in a confrontation with the local country requirements. Especially when we want to deploy as Cloud based security service. Using a Cloud Security Service will one the one hand address quite nicely the need for better security and easy deployment , on the other hand a CxO […]

Source:: Cisco Security Notice

By Tobias Mayer Sometimes having a effective and innovative solution goes in a confrontation with the local country requirements. Especially when we want to deploy as Cloud based security service. Using a Cloud Security Service will one the one hand address quite nicely the need for better security and easy deployment , on the other hand a CxO […]

Source:: Cisco Security Notice

By Story Tweedie-Yates Has anybody ever actively encouraged you to hack your own car? Did you know that hacking your car could mean diagnosing problems easily and for a lower cost than you would find at the local dealer? Did you know that the aviation industry has built in both safety and security from the ground up? How […]

Source:: Cisco Security Notice

By Story Tweedie-Yates Has anybody ever actively encouraged you to hack your own car? Did you know that hacking your car could mean diagnosing problems easily and for a lower cost than you would find at the local dealer? Did you know that the aviation industry has built in both safety and security from the ground up? How […]

Source:: Cisco Security Notice

Unsere Hersteller-Partner Sennheiser und Innovaphone sind eine technologische Partnerschaft eingegangen. Als einer der weltweit führenden Hersteller von Kopfhörern, Mikrofonen, kabellosen Übertragungssystemen und hochwertigsten Headsets für den Einsatz in Unternehmensumgebungen ist Sennheiser bekannt. Innovaphone ist seit 2003 unser technischer Partner für IP-Telefon-Lösungen.

logo-sennheiserproduct_teaser_x1_desktop_dw_pro_1_-_shoot_2product_teaser_x1_desktop_dw_pro_2_phone_-_shoot_1product_teaser_x1_desktop_sc_630-660-2_split-1

Oberberg-Online ist bereits seit vielen Jahren autorisierter Sennheiser Telecom-Partner. Wir freuen uns über die eingegangene Verbindung unserer beiden deutschen Hersteller-Partner und können aus eigener Erfahrung im täglichen Einsatz diese Kombination sehr empfehlen.

Zu Ihrem Innovaphone kompatible Sennheiser-Headsets finden Sie hier auf der Sennheiser Webseite. Alternativ dazu können Sie natürlich auch die Innovaphone-Sennheiser Kompatibilitätsübersicht bei uns herunterladen.

Die passende Lösung, um Ihrem Orthopäden ein Schnippchen zu schlagen, empfehlen wir Ihnen gerne, denn kaum etwas belastet Sie mehr, als ein zwischen Kopf und Schulter geklemmter Telefonhörer. Darüber hinaus sprechen natürlich weitere Gründe für den Einsatz eines Headsets im Geschäftsumfeld. Zum Einen werden Lautstärke-Spitzen herausgefiltert und schützen Ihr Gehör, zum Anderen ist die Gesprächsqualität für Ihren Kunden deutlich höher und frei von Störgeräuschen.

Fragen Sie uns:

Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
Dirk Zurawski
02261 9155051
zurawski@oberberg.net
Sebastian Lutz

lutz@oberberg.net

By Erin Float Today, we released the last Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2016. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition of the Cisco IOS & IOS XE Software Security Advisory […]

Source:: Cisco Security Notice

By Erin Float Today, we released the last Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2016. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition of the Cisco IOS & IOS XE Software Security Advisory […]

Source:: Cisco Security Notice

By Scott Pope “Kill chain,” a cybersecurity term coined by Lockheed Martin, is shorthand for how cyber criminals target, recon, develop, and eventually penetrate their targets. It’s among the hottest buzzwords in the cybersecurity industry right now, with many security products talking about how they address the kill chain. But playing buzzword bingo in tech often results in […]

Source:: Cisco Security Notice