By Beth Barach Activate your Cisco network as a sensor and enforcer for branch-level threat detection and response Return on investment. We often hear this phrase not only in business, but also in life. For example, when choosing home renovation projects, conventional wisdom says that updating a kitchen will yield greater return on investment than creating a guest […]

Source:: Cisco Security Notice

By Beth Barach Activate your Cisco network as a sensor and enforcer for branch-level threat detection and response Return on investment. We often hear this phrase not only in business, but also in life. For example, when choosing home renovation projects, conventional wisdom says that updating a kitchen will yield greater return on investment than creating a guest […]

Source:: Cisco Security Notice

Oberberg-Online wird 20 – Gewinnspiel Juli

Die sechste Gewinnspielrunde in unserem Jubiläumsjahr ist eröffnet. Im Juli gibt es zwei Fortinet Zippos und einen Fortinet Mini-Leatherman  zu gewinnen. Einfach aufmerksam unsere News lesen, oder auf unserer Webseite die Fortinet-Technologiepartnerseite öffnen und die Lösung ist nicht mehr sonderlich schwer.

Seit 20 Jahren sind wir der IT- und TK-Dienstleister und Lösungsanbieter für den Mittelstand im Bergischen Land.

IMG_0164

Unser Jubiläumsgewinnspiel bietet bis zur Jubiläumsveranstaltung im Oktober monatlich die Möglichkeit, attraktive Preise zu erhalten. Auf unserer Webseite wird die jeweilige Spielrunde angekündigt und mit der korrekten Beantwortung der Gewinnspielfrage landen Sie auch schon im Lostopf des jeweiligen Monats. Alle Fragen lassen sich mit Hilfe unserer Webseite beantworten. Die Lösung findet man z.B. im Bereich unserer Technologiepartner.

Los geht´s hier: Oberberg-Online Jubiläumsgewinnspiel

By Scott Harrell Every day companies are turning to digital to create new customer experiences, new business models and gain greater efficiencies. But all the while, attackers continue to advance. To defend against aggressive adversaries, security must advance to more effective solutions that are simple, automated and open. Why? Let’s take a look at a scenario that could […]

Source:: Cisco Security Notice

By Scott Harrell Every day companies are turning to digital to create new customer experiences, new business models and gain greater efficiencies. But all the while, attackers continue to advance. To defend against aggressive adversaries, security must advance to more effective solutions that are simple, automated and open. Why? Let’s take a look at a scenario that could […]

Source:: Cisco Security Notice

By Talos Group This blog post was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently observed a new ransomware variant targeting users. This ransomware shows that new threat actors are continuing to enter the ransomware market at a rapid pace due to the lucrative nature of this business model. As a result, greater numbers of unique […]

Source:: Cisco Security Notice

By Talos Group This blog post was authored by Edmund Brumaghin and Warren Mercer Summary Talos recently observed a new ransomware variant targeting users. This ransomware shows that new threat actors are continuing to enter the ransomware market at a rapid pace due to the lucrative nature of this business model. As a result, greater numbers of unique […]

Source:: Cisco Security Notice

By Talos Group This vulnerability was discovered by Piotr Bania. Talos, in coordination with Intel, is disclosing the discovery of TALOS-2016-0087, a local arbitrary code execution vulnerability within the Intel HD Graphics Windows Kernel Driver. This vulnerability exists in the communication functionality of the driver and can be exploited if a specially crafted message is sent to the […]

Source:: Cisco Security Notice

By Talos Group This vulnerability was discovered by Piotr Bania. Talos, in coordination with Intel, is disclosing the discovery of TALOS-2016-0087, a local arbitrary code execution vulnerability within the Intel HD Graphics Windows Kernel Driver. This vulnerability exists in the communication functionality of the driver and can be exploited if a specially crafted message is sent to the […]

Source:: Cisco Security Notice