In this edition we explain why an IT security check makes sense and why an external IT security team helps your internal or external IT department to make your company’s IT infrastructure considerably more secure.
Glasses, beards and pale: this is how IT professionals are often caricatured. But this will no longer apply in the future. Together with the St. Lioba School we will implement a nationwide unique school project in Bad Nauheim. The IT security girls.
Digitization is a challenge for many small and medium-sized companies that they are reluctant to tackle. The EU Commission had therefore set up a working group to offer support here. On board was the Bad Nauheim IT specialist Gordon Kirstein. The panel’s final report is now available.
In this issue we explain 10 important points that you should go through with your internal or external IT department. And these are just basics – the consistent implementation of them which will significantly protect your company!
If as an entrepreneur you want to actively shape digitisation, you should strategically approach IT and cyber security. This makes it clear: IT security is a top priority. But the topic is often put off…
Our expertise is increasingly valued in Europe. After we were invited to present our ideas and comments on IT security in Brussels for the first time in early summer, we have now been invited again.
We regularly find in projects that unfortunately the simplest things in the area of IT security are not implemented in companies. So here is a list of what we believe to be the most important points and processes that should be implemented in your company.
The Bad Nauheim IT specialists are part of an economic delegation from the Chamber of Foreign Trade and the German Federal Ministry for Economic Affairs and Energy (BMWi) in Hanoi and Ho Chi Minh City
When the European Parliament presents laws on information technology (IT) security to vote on in a few months, there is a bit of Bad Nauheim in it: Because Steffen Maurer, the IT security chief of the domestic IT service provider movetech, participates in the expert forum, which works behind the scenes for the basis of the draft law.
IT security and IT administration take different approaches.
Find out why IT administration and IT security need to be two independent areas.
There is no such thing as a typical hacker. It is neither the fat guy in the grubby hooded sweater with horn-rimmed glasses and full beard, nor the slim, sporty black-haired girl with the earrings on the motorcycle, although Hollywood always presents us these stereotypes.
Regular maintenance protects company vehicles from unpleasant breakdowns. During the main inspection, the condition is checked by an objective third party. Why you should introduce this to your IT too.
We are so happy!
As an IT service provider, we collaborate with several other companies. These collaborations are sometimes close, sometimes closer, but always characterised by trust in the work of the other. We are therefore pleased that this trust is not a one-way street: