Telefonkonferenzen bis zu 60 Teilnehmern
Die klassische Dreierkonferenz bei Telefonaten ist vermutlich jedem Nutzer hinlänglich bekannt. Sie ist mit der Innovaphone PBX und jedem Innovaphone-Telefon sofort verfügbar und im Standard-Leistungsumfang enthalten. Wenn es mehr als drei Teilnehmer sein sollen, gibt es verschiedene Ansätze, eine solche Konferenz einzuleiten und abzuhalten. Etwas umständlich, aber mit vorhandenen Bordmitteln, kann jeder Teilnehmer mit einem […]
Take incident response to the next level with AMP for Endpoints and Cognitive Threat Analytics
By Evgeny Mirolyubov Our data shows that there are 5 to 10 breaches per 1000 seats every week. That number is staggering and exemplifies the limits of traditional prevention. Most of these attacks will be done using repackaged malware distributed by known threat actors. We also see that such attacks not only remain undetected for […]
Take incident response to the next level with AMP for Endpoints and Cognitive Threat Analytics
By Evgeny Mirolyubov Our data shows that there are 5 to 10 breaches per 1000 seats every week. That number is staggering and exemplifies the limits of traditional prevention. Most of these attacks will be done using repackaged malware distributed by known threat actors. We also see that such attacks not only remain undetected for […]
Adversaries’ New Strategy: Cyber Attacks Designed for Destruction, Not Just Disruption?
By Jim Cubbage As defenders, one of our key objectives is to help organizations and individual users understand the threat landscape so they can reduce their exposure to cyber threats. Our threat researchers and technology partners watch that ever-changing landscape very closely, as they have for many years now. That’s one reason we are confident […]
Adversaries’ New Strategy: Cyber Attacks Designed for Destruction, Not Just Disruption?
By Jim Cubbage As defenders, one of our key objectives is to help organizations and individual users understand the threat landscape so they can reduce their exposure to cyber threats. Our threat researchers and technology partners watch that ever-changing landscape very closely, as they have for many years now. That’s one reason we are confident […]
Malware-Report 1-2017
Im Security-Blog unseres Partners G DATA wurden aktuell die Zahlen neu entdeckter Malware für das 1. Halbjahr 2017 veröffentlicht. Sehr spannend ist die zweite veröffentlichte Zahl – nämlich die Anzahl der Angriffe auf den einzelnen Rechner des Nutzers: im Schnitt 47 Angriffe erfolgten in den ersten 6 Monaten auf jeden einzelnen Rechner. G DATA verfolgt […]
Fortinet Threat Landscape Report Reveals Poor Security Hygiene and Risky Applications Enable Destructive Cyberattacks to Spread Infection at Record Pace
Fortinet Threat Landscape Report Reveals Poor Security Hygiene and Risky Applications Enable Destructive Cyberattacks to Spread Infection at Record Pace Source:: Fortinet

