BSI Cyber-Risk-Check

BSI Cyber Risk Check: The BSI Cyber Risk Check is a method that enables companies to determine their current state of information security. It is a systematic review that identifies vulnerabilities and potential threats within the IT infrastructure. The check helps companies identify risks, define measures to improve their information security, and minimize the likelihood[…]

Risk management

Nothing happens without risk, but wihtout risks nothing happens.(Walter Scheel, former German Federal President) Risk management is an essential factor of successful corporate management. Corporate risks are possible damaging events, which are defined by the amount of damage and the probability of occurrence. These can affect the most diverse processes and areas of a company.[…]

Protection Goals: CIA and CIAA

Protection Goals: CIA and CIAA Management Summary The traditional protection goals of information security are confidentiality, integrity and availability. These three protection goals are often referred to as the CIA triad (owing to the initial letter of the respective goals).Meanwhile, another protection goal has gained in importance. First mentioned by the BSI as a sub-area[…]

VAIT

Supervisory Requirements for IT in Insurance Companies (VAIT) Management Summary The Federal Financial Supervisory Authority (BaFin (Bundesanstalt für Finanzdienstleistungsaufsicht)) has formulated clear expectations for the management and organisation of the IT of insurance companies in the form of the Supervisory Requirements for IT in Insurance Companies (VAIT (Versicherungsaufsichtliche Anforderungen an die IT )). On the[…]

Plan against Ransomware

10 Points Plan against Ransomware You have heard about Cryptolocker Infection over the news? In this article you can learn more about this type of malware and receive tips and suggestions on how to protect your company against Ransomware. Reading time 5 minutes. What is Ransomware? Over the past few years, we have witnessed the[…]

Cybersecurity Glossary

In an increasingly interconnected world where societies depend on digital infrastructure, cyber security is becoming increasingly relevant. The fact that data breaches are becoming increasingly frequent and hacker attacks on power suppliers are successful shows the impact that insufficient cybersecurity can cause. In this glossary you will find a condensed overview of the most important[…]

Roadmap Cloud

Author: Carsten ReffgenThe introduction of new technologies is always a challenge as much as a risk for IT executives. With cloud computing there are additional issues as cloud computing changes processes and the collaboration with other departments. In the following, we provide an overview and suggestions as to which subjects fall in your responsibility as[…]