+49 6151 6290246

E-Mail Security with SPF, DKIM and DMARC

SPF, DKIM and DMARC are standards to contain spoofing and pishing attacks. The record is quickly made. We show you how to do it.

Meet us at Cloud Expo 2022 to improve the security of your IT environment

Protection against cyber attacks - LocateRisk helps. For quick support, we provide all organisations with an IT security assessment of their external IT attack surface - free of charge. Talk to us directly about it at the booth.

Log4j Vulnerability - Find out which of your servers are affected

Security vulnerability in Log4j - attacks are already underway. Do not waste time and check the security of your systems.

Statistic on IT security: Hessian municipalities

IT security experts have long warned about the cyber risks in public administrations. The problems are well known. The results are still lacking.

IT security statistics: the parties

What is the state of cybersecurity in Germany? What is the situation like among the parties? Our survey shows that there is still a lot of room for improvement.

How you can increase your IT security with automated monitoring

Increasingly sophisticated, automated cyberattacks are driving up the resource and cost expenditures for IT security. This makes it all the more important for IT managers to be able to prove the effectiveness and profitability of their investments in attack prevention. This requires that they are able to efficiently assess the company-wide IT security status and communicate the result to the management level in a comprehensible manner.


Why data protection is essential in cybersecurity

Cybersecurity automatically brings the topic of data protection automatically comes to the fore. Anyone who does not optimize their website will face sanctions ...

Social Hacking, Cyber Espionage and Co.

Cybercrime will play an increasingly important role in the future. Especially for companies. And only those who know their adversaries can better protect their companies. This makes it all the more important to know the technologies used by attackers and to understand how they work. In Germany alone, attacks run into the high six-figure range every day - and the trend is rising. The speed at which attacks are carried out and the focus of the attackers are changing. For example, at 190 GBit per second, it is no longer just operating systems or browsers that are attacked, but also chips, processors and surveillance cameras, among other things.

6 Measures to protect against cybercrime

New technologies and the Internet of Things are part of everyday life for companies in all industries. However, the use of the Internet and networked communication devices results in numerous risks such as identity theft, data espionage and virus attacks. Especially if you store personal data on your website, it is important to guarantee your customers the best possible protection against cyberattacks. Therefore, it is [...]

Cybercrime?! Doesn't concern us! Or does it?

The quality and scope of cyberattacks have been increasing for years. In 2019, damages in Germany amounted to approximately 102.9 billion euros, according to Bitkom. This amount is almost twice as high as in 2017, which is reason enough to take a closer look at the topic.


Learn more, book a demo, or just have a quick chat? Alex is happy to help!

Your personal consultant
Alexander Feldmann,

+49 6151 6290246

Get in touch now