Understanding the five key phases of a hacking attack to fortify your business IT

The term ‘Hacking’ has been in the public consciousness for decades and the activities of the nefarious individuals...

29.11.2023

Start your Industry 4.0 transformation: automate quality inspections with video analytics

Industry 4.0 technologies like video analytics are becoming more affordable, enabling smaller manufacturers to start...

17.12.2021

Video analytics: smart solutions that bring everything into focus

Video surveillance is a useful tool for monitoring workplace safety and security. Imagine if it could also alert you...

10.12.2021

GDPR 2021: data protection and access to personnel files

Dealing with personal data, such as that of employees and customers, is often an unforeseen difficulty for SMEs...

08.04.2021

Safe workplace – well-protected, secure working

Whether your new office is at home, you have a conventional office at the company, or a mixture of the two: security...

25.01.2021

AI in cybersecurity – a game of thrones

The development in technology is progressing continuously. Ransomware and other cyber threats do not constitute an...

16.12.2020

How remote work is transforming cybersecurity

As organizations of all sizes extend their commitment to supporting remote workforces for the future, cybersecurity...

29.09.2020

Backup management: every business needs an emergency exit

Losing data can be catastrophic for any business. So it is crucial to protect yourself against loss and invest in...

25.10.2019

Data security now

Why is data security so important to SMEs? And what does a comprehensive information security concept involve? Job...

28.08.2019

Data security: how SMEs protect company data

IT security, information security and data security are three terms to describe the same important task: in times of...

04.07.2019
For you from us: