Christian Höfig

Budget in IT security!

Every company has a budget that is dedicated to IT. Consequently, some of that should go toward maintaining the company’s cybersecurity. This can take on very different dimensions. A budget for IT security! Within a company you have different budgets for certain areas. For example, every company has a budget … continue reading

The pros and cons of clouds!

Clouds are used a lot. It is often more clever and practical to be able to access your data from anywhere. That’s why cloud services are becoming more and more relevant and are indispensable these days. However, there are also certain disadvantages that can occur when using clouds. Pros and … continue reading

Chishing – attack on business chats!

Nowadays, communication within companies increasingly takes place via business chats. External partners are also being added more and more to what are actually internal business chats, increasing the attack surface. Now we have found out that with a lot of chat tools it is possible to edit a profile in … continue reading

DNS – The phone book of the Internet!

DNS stands for Domain Name System and is one of the most important services on the World Wide Web. Since it has such a central role, it is very important that it is configured properly. Incorrect configurations can cause errors as well as serious security vulnerabilities. What exactly is DNS? … continue reading

Email encryption – this is how it works!

Unfortunately, encryption of emails is used far too little, although it has long been known that emails can be intercepted by third parties on their way to their recipients. The reason why asymmetric encryption is so little used for emails may be that setting up such procedures is usually complicated … continue reading