Our expertise is increasingly valued in Europe. After we were invited to present our ideas and comments on IT security in Brussels for the first time in early summer, we have now been invited again.
If as an entrepreneur you want to actively shape digitisation, you should strategically approach IT and cyber security. This makes it clear: IT security is a top priority. But the topic is often put off…
We regularly find in projects that unfortunately the simplest things in the area of IT security are not implemented in companies. So here is a list of what we believe to be the most important points and processes that should be implemented in your company.
The Bad Nauheim IT specialists are part of an economic delegation from the Chamber of Foreign Trade and the German Federal Ministry for Economic Affairs and Energy (BMWi) in Hanoi and Ho Chi Minh City
When the European Parliament presents laws on information technology (IT) security to vote on in a few months, there is a bit of Bad Nauheim in it: Because Steffen Maurer, the IT security chief of the domestic IT service provider movetech, participates in the expert forum, which works behind the scenes for the basis of the draft law.
IT security and IT administration take different approaches.
Find out why IT administration and IT security need to be two independent areas.
There is no such thing as a typical hacker. It is neither the fat guy in the grubby hooded sweater with horn-rimmed glasses and full beard, nor the slim, sporty black-haired girl with the earrings on the motorcycle, although Hollywood always presents us these stereotypes.
Regular maintenance protects company vehicles from unpleasant breakdowns. During the main inspection, the condition is checked by an objective third party. Why you should introduce this to your IT too.
We are so happy!
As an IT service provider, we collaborate with several other companies. These collaborations are sometimes close, sometimes closer, but always characterised by trust in the work of the other. We are therefore pleased that this trust is not a one-way street:
Every break in a routine means stress. The two following options are available: One is to practice emergency plans. They define, for example, how to react to certain incidents: You are familiar with this from the obligatory fire drill or the first aid course. The second option is the possibility of identifying security gaps so that they do not even arise in normal operation.
From 25 May 2018, it’s getting serious. The EU General Data Protection Regulation, or GDPR for short, takes effect. In view of the approaching date, for many companies it is becoming clear that they still have room for improvement in the area of data protection. Possibly quite a bit of room …
A penetration test is a check of your IT for IT security gaps and weak points. Here the system is checked very practically, mainly, on a technical level from the perspective of an attacker. The theory only plays a subordinate role.
External attacks are no longer a horror vision. They happen. Every day. Many automatically and without a conscious goal, but behind some attacks there are concrete interests.
We are part of the European “Digital Skills and Job Coalition” and are committed to training specialists and equipping them with high-quality digital skills. This places us in the list of European SMEs participating in the campaign #digitalSME4skills of the European Digital SME Alliance (DIGITAL SME).