Federal Law Enforcement Training Center’s 2016 Cybercrime Conference

By Jessica Bair Cisco Systems is participating in the Federal Law Enforcement Training Center’s (FLETC) Cybercrime Conference, held July 6-8, 2016, in Glynco, Georgia. The purpose of this event is to foster education and awareness of the current threats and innovations that may impact today’s law enforcement officers and the manner in which they deal with cybercrime. The […]

Source:: Cisco Security Notice

Federal Law Enforcement Training Center’s 2016 Cybercrime Conference

By Jessica Bair Cisco Systems is participating in the Federal Law Enforcement Training Center’s (FLETC) Cybercrime Conference, held July 6-8, 2016, in Glynco, Georgia. The purpose of this event is to foster education and awareness of the current threats and innovations that may impact today’s law enforcement officers and the manner in which they deal with cybercrime. The […]

Source:: Cisco Security Notice

New Cisco AnyConnect – Way More than VPN

By Casey Ulaky Mobile Security Made Simple, Cisco AnyConnect 4.3 is Now Available Mobile workers are expected to account for nearly three quarters of the total U.S. workforce by 2020 –that’s more than 105 million people. And nearly every one of them uses multiple devices to connect to the network. Each of these endpoints provides one more opportunity for […]

Source:: Cisco Security Notice

New Cisco AnyConnect – Way More than VPN

By Casey Ulaky Mobile Security Made Simple, Cisco AnyConnect 4.3 is Now Available Mobile workers are expected to account for nearly three quarters of the total U.S. workforce by 2020 –that’s more than 105 million people. And nearly every one of them uses multiple devices to connect to the network. Each of these endpoints provides one more opportunity for […]

Source:: Cisco Security Notice

Howto:Feature List in English

Source:: Innovaphone

Howto:Feature List in English

Source:: Innovaphone

G DATA Ratgeber – Was ist eigentlich Ransomware

G DATA Ratgeber – Was ist eigentlich Ransomware

Im Laufe der Zeit sammeln sich viele persönliche und geschäftliche Daten auf Ihrem Computer. Genau hier setzen die Täter an und versuchen, Ihr System mit einem Verschlüsselungstrojaner zu infizieren, um eine Lösegeld (engl. Ransom) von Ihnen für die Wiederherstellung Ihrer Daten zu erpressen.

Wenn statt Ihres gewohnten Startbildschirms plötzlich nur noch ein Totenkopf oder einen Erpresserbrief auf Ihrem Monitor erscheint, haben Sie es höchstwahrscheinlich mit Ransomware zu tun.

Ransomware sind Schadprogramme, die den Computer sperren oder darauf befindliche Daten verschlüsseln. Die Täter erpressen ihre Opfer, indem sie deutlich machen, dass der Bildschirm oder die Daten nur nach einer Lösegeldzahlung wieder freigegeben werden.

Mehr zum Thema finden Sie hier auf der Seite unseres Technologiepartners G DATA.

Gerne zeigen wir Ihnen auch unsere Lösungen, um den Schutz Ihrer Daten zu verbessern. Dazu zählen Backup-Systeme, G DATA Software zum Schutz Ihrer Rechner und Lösungen unseres Technologiepartners Fortinet zum Schutz des Haupteinfallsweges (etwa 95% der Infektionen erfolgen via E-Mail), der Netzwerkgrenze (u.a. zum Schutz vor infizierten Webseiten) und zur Erkennung bisher unbekannter Muster (Sandboxing).

GDATA-Infographic-Datensicherung-1040_RGB_71631w1000h606

DSC_4805kk DSC_2131b klein DSC_2066 klein
Frank Erlinghagen

02261 9155055
erlinghagen@oberberg.net

Jörg Wegner

02261 9155052
wegner@oberberg.net

Daniel Wenzlau

02261 9155054
wenzlau@oberberg.net

Telefonica and Fortinet Announce Strategic Alliance Agreement to Offer Managed Security Services

Telefonica and Fortinet Announce Strategic Alliance Agreement to Offer Managed Security Services

Source:: Fortinet

Telefonica and Fortinet Announce Strategic Alliance Agreement to Offer Managed Security Services

Telefonica and Fortinet Announce Strategic Alliance Agreement to Offer Managed Security Services

Source:: Fortinet

pxGrid Keeps Growing

By Andrew Peters With ten new partners you know it’s not an illusion Do you remember that magic trick with the metal rings that seem linked together? The magician pulls and an audience member pulls and the rings seem to be solid – forming an unbreakable chain. But with sleight of hand they come apart. It’s just an […]

Source:: Cisco Security Notice