loader image
Users lull themselves in false Password Security

Users lull themselves in false Password Security

LastPass’ annual report on the psychology of password use shows that password behavior has not improved despite cybersecurity education campaigns. Users of all ages lull themselves into false password security. Source: it-business.de #password #security...
Finally: important News on the Data Protection Certification

Finally: important News on the Data Protection Certification

What do you do when a customer wants to know whether you adhere to a high data protection standard when processing customer data? At present, you either confirm this yourself, for example as part of a contract, or you refer to a data protection certificate you once...
Be careful when shopping online for Christmas!

Be careful when shopping online for Christmas!

Christmas time, merry time? Not if cybercriminals take advantage of consumers’ preference for online shopping and steal their personal data or financial information. Source: cloudcomputing-insider.de #Christmas #Cybersecurity #Cybercrime #newnormal #newnormalint...
7 Settings that make AWS Accounts more secure

7 Settings that make AWS Accounts more secure

If you just set up your #Amazon Web Services (#AWS) account and are worried about data security, there are good reasons: Often, uncertain company-wide settings or simple misconfigurations put your data at high risk. However, with a few simple steps, you can...
Shared Responsibility for the Cloud, but not in Data Protection!

Shared Responsibility for the Cloud, but not in Data Protection!

In the shared responsibility model, #cloud providers and users share tasks and responsibilities. From a data protection perspective, the user also bears responsibility for the security of the cloud infrastructure when it impacts data security. Source: it-business.de...
Five Requirements ID Cloud Providers should meet

Five Requirements ID Cloud Providers should meet

Data breaches due to inadequate identity management are becoming an increasingly common regulatory, compliance, and security risk. At the same time, a consistent user experience in identity management of employees, customers and business partners is becoming more...

Pin It on Pinterest