IT - Blog
Ensure communication within the company – even and especially during a cyberattack!
Secure your communication in the event of a cyber attack.
8. May 2024
No Comments
IT - Blog
Kommunikation im Unternehmen sicherstellen – auch und gerade während eines Hackerangriffs!
Kommunikation im Falle eines Cyberangriffs sicherstellen >> Warum und eine Lösung
8. May 2024
No Comments
IT - Blog
Easily minimize attack surfaces and security gaps
A easy way to minimize attack surfaces and security gaps on Endpoints.
7. May 2024
No Comments
IT - Blog
Two-factor authentication is older than you think
Is a Two Factor Authentication needed and how long does it actually exist?
3. May 2024
No Comments
IT - Blog
Selling without sales is real selling
When you create and give a workshop for technicians, you should focus on real content that aligns with today’s needs. Even if it means that every workshop has a different agenda.
1. May 2024
No Comments
IT - Blog
Cybersecurity discussions annoy every admin! – and how to put an end to it!
What’s with all the discussions about the need for a cybersecurity strategy and corresponding solutions? – or – How to put an end to it! read my thoughts and recommendations.
17. April 2024
No Comments