By Erin Float Today, we released the last Cisco IOS & IOS XE Software Security Advisory Bundled Publication of 2017. (As a reminder, Cisco discloses vulnerabilities in Cisco IOS and IOS XE Software on a predictable schedule—the fourth Wednesday of March and September in each calendar year). Today’s edition of the Cisco IOS & IOS XE Software Security Advisory […]

Source:: Cisco Security Notice

By Susan Runowicz-Smith New troubling cyberattacks are in the news almost daily. No one is immune. Have you checked your credit score lately? I just finished freezing mine. A national credit bureau breach is the latest wide-ranging theft of data to hit the news. You are probably wondering: “Is my network secure and what would happen if we […]

Source:: Cisco Security Notice

By Susan Runowicz-Smith New troubling cyberattacks are in the news almost daily. No one is immune. Have you checked your credit score lately? I just finished freezing mine. A national credit bureau breach is the latest wide-ranging theft of data to hit the news. You are probably wondering: “Is my network secure and what would happen if we […]

Source:: Cisco Security Notice

By Edna Conway Third parties remain a critical source of security risk. The recent discovery of malware embedded within the consumer application CCleaner, discovered by Cisco’s Talos cybersecurity research team, reminds us that cyber hygiene lies not just within ourselves. Talos stated in its September 18th Update: “Supply chain attacks are a very effective way to distribute malicious […]

Source:: Cisco Security Notice

By Edna Conway Third parties remain a critical source of security risk. The recent discovery of malware embedded within the consumer application CCleaner, discovered by Cisco’s Talos cybersecurity research team, reminds us that cyber hygiene lies not just within ourselves. Talos stated in its September 18th Update: “Supply chain attacks are a very effective way to distribute malicious […]

Source:: Cisco Security Notice

By John Dominguez You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from the shattered window […]

Source:: Cisco Security Notice

By John Dominguez You’re walking down the sidewalk, headphones in your ears, music blasting, and your head is buried in your phone reading a text message. CRUNCH. You look down and you’ve just stepped in a pile of… (no, not that)… broken glass. A car parked on the street was broken-into, and the glass from the shattered window […]

Source:: Cisco Security Notice

FUJITSU CELVIN NAS sind die idealen Netzwerk-Datenspeicher für KMU. Kombiniert mit den Vorteilen eines dezentralen Backups in der Regio-Cloud Oberberg senken Sie das Risiko vor Datenverlust deutlich – und schlafen bedeutend ruhiger.

Stellen Sie sich einfach einmal vor, in Ihrem IT-Raum kommt es zu einem Brand, oder zu einer Überhitzung, die Ihre Daten unlesbar machen. Wie lange benötigen Sie, um die verlorenen Daten wiederherzustellen? Gelingt dies überhaupt? Gibt es eine räumlich getrennte Version des Backups?

Minimieren Sie diese Risiken auf einfache Art und Weise. Mit einem preiswerten FUJITSU CELVIN NAS System in unserem regionalen Rechenzentrum haben Sie immer eine Kopie Ihrer Daten außerhalb des eigenen Gefahrenbereiches verfügbar. Nicht im Ausland, nicht bei Datenhändlern, sondern bei Oberberg-Online, Ihrem persönlichen Partner in der Region.

Wie einfach und preiswert ruhiger Schlaf zu bekommen ist, zeigen wir Ihnen gerne:

Daniel Wenzlau
02261 9155054
wenzlau@oberberg.net
DSC_2012 klein
Frank Erlinghagen
02261 9155055
erlinghagen@oberberg.net
DSC_2022 klein
Jörg Wegner
02261 9155052
wegner@oberberg.net

By Thomas Licisyn Trust gets a bad rap in the security industry, but in reality, it’s a necessary part of any relationship. Without trust, today’s organizations couldn’t function, and productivity would come to a screeching halt. The thing is – how do you know that the devices coming onto your network are trustworthy? We already verify user access […]

Source:: Cisco Security Notice

By Thomas Licisyn Trust gets a bad rap in the security industry, but in reality, it’s a necessary part of any relationship. Without trust, today’s organizations couldn’t function, and productivity would come to a screeching halt. The thing is – how do you know that the devices coming onto your network are trustworthy? We already verify user access […]

Source:: Cisco Security Notice