Sicherheit und Schutz persönlicher Daten

Den Arbeitsplatz verlassen, ohne den Rechner zu sperren ist keine gute Idee. Insbesondere bei offen einsehbaren Bildschirmen wird hier ein großes Risiko eingegangen. Die regelmäßige Sensibilisierung der Mitarbeiter ist auch hier ein wichtiger Bestandteil der Cyber Security Strategie für Unternehmen. Gerne helfen wir Ihnen hierbei: Dirk Zurawski 02261 9155051 zurawski@oberberg.net Dennis Goslar goslar@oberberg.net Bastian Breidenbach breidenbach@oberberg.net

Support:IQM Build 8021600 available

Source:: Innovaphone

Support:IQM Build 8021600 available

Source:: Innovaphone

Three Ways in which Stealthwatch Helps You Get More from Your Network Data

By TK Keanini Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, […]

Three Ways in which Stealthwatch Helps You Get More from Your Network Data

By TK Keanini Do you know what the greatest Olympian of all time and Stealthwatch have in common? Both work harder and smarter for unbeatable performance. I recently heard from the one-and-only, Michael Phelps. He said that very early on, he and his coach set very high goals. And he knew that to achieve them, […]

Tackling the Threat Landscape with Innovative Partnerships

By Anthony Grieco As countries digitize to expand economic growth, promote a secure environment for investment, job creation and global competitiveness, cyber attackers are also seeing the monetary and political opportunity to exploit digital expansion and its data to their advantage. The dynamic threat landscape is not a challenge to be solved by one organization, […]

Tackling the Threat Landscape with Innovative Partnerships

By Anthony Grieco As countries digitize to expand economic growth, promote a secure environment for investment, job creation and global competitiveness, cyber attackers are also seeing the monetary and political opportunity to exploit digital expansion and its data to their advantage. The dynamic threat landscape is not a challenge to be solved by one organization, […]