Regular IT security checks as an essential component of risk provisioningRisk precautions are supposedly just as unwelcome as health precautions. But they are just as important! Various studies prove: Attacks…05/05/2022
Information Security and/or IT Security?The terms IT security or information security are often used synonymously, go in a comparable direction but mean different things.…04/28/2022
700,000 online shopper information unprotected on the webNumerous details about people, their purchases and other sensitive details could be accessed unprotected on the web for months, as…07/02/2021
Vulnerability in Samba LDAP server – regular patching protects against negative effectsA serious vulnerability exists in the popular Samba server, which provides Windows file and print services in Linux environments. Linux…04/07/2021
The Hafnium Exchange Server Hack and its Late Effects – Prevention is the KeyThe Exchange server hack from the spring of 2021, which became known as Hafnium, is spreading: numerous servers that have…03/24/2021
Cloud data center fire – are your security measures up to date?In a data center of the cloud provider OVH in Strasbourg, millions of customer data were finally destroyed in February…03/17/2021
SCOD – Security Consultant on DemandAre you already familiar with our SCOD consulting service? SCOD stands for Security Consultant on Demand – and for being…03/01/2021
Internal audits for your ISO 27001 ISMSISO 27001 requires you to conduct an internal audit of your ISMS on a regular basis to verify conformity with…02/18/2021
Save time and money when documenting an ISMSInstant 27001 is a solution that saves an enormous amount of time and money when setting up and operating an…10/27/2020
ISO 9001 Quality Management Systems with Instant 27001 and the ISO 9001 Add-onDid you know that numerous ISO standards are largely harmonized with regard to their core structure – chapters 4 to…09/28/2020
Vulnerability Scanning & Penetration Testing Services from TEN Information ManagementChecks of IT security are useful and advisable for a variety of reasons. External reasons such as regulatory requirements –…09/01/2020
Documenting ISMS with Instant 27001One of the biggest challenges in setting up and operating information security management systems according to ISO 27001 is the…08/03/2020