The Log4j vulnerability has demonstrated the importance of supply chain security. In this blog post we consider the best course of action that companies can take to protect their software supply chain.
Posts of category: IT Security
IT security is a critical asset for companies and authorities in 2021 – after all securing data communication affects the most important business activities and services across an organization. With the demand for remote and mobile working at an all-time high, organizations need to act strategically on endpoint security and IT administration to protect their networks and sensitive data. Cybersecurity is the spearhead of any IT infrastructure and needs to be considered strategically from the outset – from cloud computing, data center operations and IIoT to regulated industries or health applications. Find out everything you need to know about the world of IT security.
Companies must ensure that endpoint security is given the highest priority. This is especially true for hybrid working environments.
Ransomware attacks are particularly cruel: Cyber criminals encrypt data and demand a ransom for its safe release, threatening that they will either delete data to bring a company to its knees or make the data public. For important business data and sensitive, personal ...
Passwords remain a vulnerability. Multi-factor authentication and time-based one-time passwords can help to enhance password security and shut out attackers.
Passwords are not strong enough: 2FA and time-based one-time passwords (TOTP) enhance security Plus: Online services that already support TOTP.
Two-factor authentication (2FA): What you need to know before activating 2FA and what to back up.
Please select a year.