Strategy

Start-Ups

Start-ups and their indispensable IT security

Startups have recently become a popular target for cyber attacks. Meanwhile, cybercriminals are no longer necessarily trying to catch the big companies, but are nesting in the IT systems of small companies and businesses. Once they have gained a foothold there, all doors are usually open to them, because most … continue reading

Email encryption – this is how it works!

Unfortunately, encryption of emails is used far too little, although it has long been known that emails can be intercepted by third parties on their way to their recipients. The reason why asymmetric encryption is so little used for emails may be that setting up such procedures is usually complicated … continue reading

Privilege Escalation – The attainment of new rights!

In the context of a privilege escalation, the attacker tries to gain more rights on the target system. Such privilege escalation may be necessary to load additional malware or start other processes for which the ordinary user has no rights. In a recent case, an attacker can gain admin rights … continue reading

What is a firewall?

The term firewall appears very often in the context of corporate IT security. But what exactly is a firewall and what are the different types? So that you too can use this IT security tool correctly, we explain everything about the firewall in this article. What is a firewall? In … continue reading