+49 6151 6290246
image

Log4j Vulnerability - Find out Which of Your Servers Are Affected

Security vulnerability in Log4j - attacks are already underway. Do not waste time and check the security of your systems.

Statistic on IT Security: Hessian Municipalities

IT security experts have long warned about the cyber risks in public administrations. The problems are well known. The results are still lacking.

IT Security Statistics: The Parties

What is the state of cybersecurity in Germany? What is the situation like among the parties? Our survey shows that there is still a lot of room for improvement.

How You Can Increase Your IT Security with Automated Monitoring

Increasingly sophisticated, automated cyberattacks are driving up the resource and cost expenditures for IT security. This makes it all the more important for IT managers to be able to prove the effectiveness and profitability of their investments in attack prevention. This requires that they are able to efficiently assess the company-wide IT security status and communicate the result to the management level in a comprehensible manner.

The Digital Footprint: A Walk through the WWW

Whether it's a social media post, a quickly sent e-mail or a click made online: All of this leaves traces on the internet that reveal a lot about you...

Why Data Protection Is Essential in Cybersecurity

With the increasing relevance of cyber security, the topic of data protection automatically comes to the fore. Those who do not consider the topic extensively and optimize their website accordingly must expect sanctions.

en_USEnglish

Learn more, book a demo, or just have a quick chat? Alex is happy to help!

Your personal consultant
Alexander Feldmann,
Consulting

+49 6151 6290246

Get in Touch Now