Digitization is a challenge for many small and medium-sized companies that they are reluctant to tackle. The EU Commission had therefore set up a working group to offer support here. On board was the Bad Nauheim IT specialist Gordon Kirstein. The panel’s final report is now available.
In this issue we explain 10 important points that you should go through with your internal or external IT department. And these are just basics – the consistent implementation of them which will significantly protect your company!
If as an entrepreneur you want to actively shape digitisation, you should strategically approach IT and cyber security. This makes it clear: IT security is a top priority. But the topic is often put off…
Our expertise is increasingly valued in Europe. After we were invited to present our ideas and comments on IT security in Brussels for the first time in early summer, we have now been invited again.
We regularly find in projects that unfortunately the simplest things in the area of IT security are not implemented in companies. So here is a list of what we believe to be the most important points and processes that should be implemented in your company.
The Bad Nauheim IT specialists are part of an economic delegation from the Chamber of Foreign Trade and the German Federal Ministry for Economic Affairs and Energy (BMWi) in Hanoi and Ho Chi Minh City
When the European Parliament presents laws on information technology (IT) security to vote on in a few months, there is a bit of Bad Nauheim in it: Because Steffen Maurer, the IT security chief of the domestic IT service provider movetech, participates in the expert forum, which works behind the scenes for the basis of the draft law.
IT security and IT administration take different approaches.
Find out why IT administration and IT security need to be two independent areas.
There is no such thing as a typical hacker. It is neither the fat guy in the grubby hooded sweater with horn-rimmed glasses and full beard, nor the slim, sporty black-haired girl with the earrings on the motorcycle, although Hollywood always presents us these stereotypes.
Regular maintenance protects company vehicles from unpleasant breakdowns. During the main inspection, the condition is checked by an objective third party. Why you should introduce this to your IT too.
We are so happy!
As an IT service provider, we collaborate with several other companies. These collaborations are sometimes close, sometimes closer, but always characterised by trust in the work of the other. We are therefore pleased that this trust is not a one-way street:
Every break in a routine means stress. The two following options are available: One is to practice emergency plans. They define, for example, how to react to certain incidents: You are familiar with this from the obligatory fire drill or the first aid course. The second option is the possibility of identifying security gaps so that they do not even arise in normal operation.
From 25 May 2018, it’s getting serious. The EU General Data Protection Regulation, or GDPR for short, takes effect. In view of the approaching date, for many companies it is becoming clear that they still have room for improvement in the area of data protection. Possibly quite a bit of room …