Current study proves: Shortage of skilled workers and fear of cyberattacks determine IT security A study by G DATA, Statista and brand eins confirms that IT security in the DACH region is in a…11/14/2022
What actually is privilege escalation in IT applications?Privilege escalations in applications – often referred to as privilege escalation – are vulnerabilities that allow attackers or even regular…10/11/2022
What exactly is examined during ISO 27001 certification?What exactly is examined during ISO 27001 certification? There are many myths surrounding this question. Many believe that “IT security”…08/17/2022
4 questions in preparation for your IT security auditMany organisations trust that their own systems and applications “will be secure somehow”. Especially when third parties such as IT…07/29/2022
The new ISO 27001:2022 is coming! What is new?If we closely review the ISO 27001:2013 standard or the draft of the new 27001:2022, we see that the terms…06/21/2022
Cloud is no panaceaOne of the core competences of cloud service providers is the safeguarding of infrastructures with regard to IT security. But…06/06/2022
“Internal Audit” vs Management Review: What’s the difference?This question is often asked by novices who are dealing with ISO 27001 for the first time. What is an…05/31/2022
Regular IT security checks as an essential component of risk provisioningRisk precautions are supposedly just as unwelcome as health precautions. But they are just as important! Various studies prove: Attacks…05/05/2022
Information Security and/or IT Security?The terms IT security or information security are often used synonymously, go in a comparable direction but mean different things.…04/28/2022
700,000 online shopper information unprotected on the webNumerous details about people, their purchases and other sensitive details could be accessed unprotected on the web for months, as…07/02/2021
Vulnerability in Samba LDAP server – regular patching protects against negative effectsA serious vulnerability exists in the popular Samba server, which provides Windows file and print services in Linux environments. Linux…04/07/2021
The Hafnium Exchange Server Hack and its Late Effects – Prevention is the KeyThe Exchange server hack from the spring of 2021, which became known as Hafnium, is spreading: numerous servers that have…03/24/2021
Cloud data center fire – are your security measures up to date?In a data center of the cloud provider OVH in Strasbourg, millions of customer data were finally destroyed in February…03/17/2021
SCOD – Security Consultant on DemandAre you already familiar with our SCOD consulting service? SCOD stands for Security Consultant on Demand – and for being…03/01/2021
Internal audits for your ISO 27001 ISMSISO 27001 requires you to conduct an internal audit of your ISMS on a regular basis to verify conformity with…02/18/2021
Save time and money when documenting an ISMSInstant 27001 is a solution that saves an enormous amount of time and money when setting up and operating an…10/27/2020
ISO 9001 Quality Management Systems with Instant 27001 and the ISO 9001 Add-onDid you know that numerous ISO standards are largely harmonized with regard to their core structure – chapters 4 to…09/28/2020
Vulnerability Scanning & Penetration Testing Services from TEN Information ManagementChecks of IT security are useful and advisable for a variety of reasons. External reasons such as regulatory requirements –…09/01/2020
Documenting ISMS with Instant 27001One of the biggest challenges in setting up and operating information security management systems according to ISO 27001 is the…08/03/2020