window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-JYLJ7J3717');

Cybercrime

N R
  • NIS2: Europas Update zur Cyberabwehr - Was die NIS2-Richtlinie für uns bedeutet

NIS2: Europe’s cyber defense update – What the NIS2 directive means for us

2024-05-08T13:18:51+02:00Categories: IT Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Who is affected by the NIS regulations? The extended scope of the NIS2 Directive. Enter NIS2: A tightening, an expansion, a necessary evolution. The new NIS2 Directive extends the scope, tightens security and reporting obligations and aims to increase Europe's resilience to cyber attacks. From energy suppliers to digital platforms and public administrations - almost no organization is exempt. The transformation from NIS to NIS2 is therefore not just a change of form, but is intended to be a decisive step in the expansion of our digital fortress.

  • Ransomware Angriffe - Pay or Loose

Ransomware

2024-02-22T08:27:10+01:00Tags: , , , , , , , , , |

Ransomware is therefore blackmail software, also known as an encryption Trojan. Ransomware is one of the most dangerous cyber attacks and is currently widespread. Ransomware is therefore blackmail software, also known as an encryption Trojan, which encrypts data or blocks access rights to directories, files and applications on attacked servers and computers. A ransom, typically in a cryptocurrency, is demanded for decryption. What is the most effective way to protect ourselves against ransomware attacks? Find out more now...

Go to Top