Attacking the Weakest Link in the Supply Chain

By Marc Blackmer What Just Happened?! Millions invested in the latest security technologies? Check. Your team trained on information security best practices? Check. Passed a third-party review of your security architecture? Check. So, how the hell were hundreds of your servers‘ hard drives just destroyed by malware within minutes?! That’s exactly what your CEO, your […]

Support:Recording Build 117900 available

Source:: Innovaphone

Support:Recording Build 117900 available

Source:: Innovaphone

Sicherheit und Schutz persönlicher Daten

Den Arbeitsplatz verlassen, ohne den Rechner zu sperren ist keine gute Idee. Insbesondere bei offen einsehbaren Bildschirmen wird hier ein großes Risiko eingegangen. Die regelmäßige Sensibilisierung der Mitarbeiter ist auch hier ein wichtiger Bestandteil der Cyber Security Strategie für Unternehmen. Gerne helfen wir Ihnen hierbei: Dirk Zurawski 02261 9155051 zurawski@oberberg.net Dennis Goslar goslar@oberberg.net Bastian Breidenbach breidenbach@oberberg.net

Support:IQM Build 8021600 available

Source:: Innovaphone

Support:IQM Build 8021600 available

Source:: Innovaphone

Three Ways in which Stealthwatch Helps You Get More from Your Network Data

By TK Keanini Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, […]