Blog

News about information & data security, as well as about TEN Information Management GmbH

Numerous details about people, their purchases and other sensitive details could be accessed unprotected on the web for months, as Der Spiegel (German content) prominently reports on its website. A service provider had inadequately secured...
A serious vulnerability exists in the popular Samba server, which provides Windows file and print services in Linux environments. Linux systems should be updated as soon as possible, because the vulnerability with the identifier CVE-2020-27840...
The Exchange server hack from the spring of 2021, which became known as Hafnium, is spreading: numerous servers that have still not been patched are being attacked, the gap exploited, and malware installed. Many server...
In a data center of the cloud provider OVH in Strasbourg, millions of customer data were finally destroyed in February 2021. Apparently, the fire protection measures were not sufficient. What about your information security measures?...
Are you already familiar with our SCOD consulting service? SCOD stands for Security Consultant on Demand – and for being available to you at short notice at any time for all your information security questions....
ISO 27001 requires you to conduct an internal audit of your ISMS on a regular basis to verify conformity with the standard. Although it is called an “internal audit”, you can – and should –...
Instant 27001 is a solution that saves an enormous amount of time and money when setting up and operating an ISMS according to ISO 27001. Users benefit not only from the fact that Instant 27001...
Did you know that numerous ISO standards are largely harmonized with regard to their core structure – chapters 4 to 10? This is true for the international standards for quality management – ISO 9001 –...
Checks of IT security are useful and advisable for a variety of reasons. External reasons such as regulatory requirements – the KRITIS regulation or the IT security law are examples – may require such reviews....
One of the biggest challenges in setting up and operating information security management systems according to ISO 27001 is the adequate documentation. This is subject to audit reviews and also helps the organization to appropriately...