The reknown IP Telephony specialist from Berlin extends the warranty on its IP endpoints from two to three years by increasing the efficient services the company always offered to its customers.
Have questions? Get in touch with us!
G DATA Italia confirms: the level of disinformation of young people is still worrying in the face of the risks to which they are exposed at a too early age.
Technology as the only way to prevent cyber attacks is not more enough: the human factor is very important and it has to be considered within IT security policies in a company. Through targeted actions of staff training, a status of awareness should be reached, putting the collaborator as [...]
Soit-il à la maison ou en vacances, en été on désire plus de liberté, sérénité et on veut profiter de la paix. Rien de plus facile : les produits FRITZ! s’occupent de tout ! Les utilisateurs les plus exigeants peuvent même porter leur propre réseau domestique directement en vacances.
Big sport events such as the World Cup are particularly interesting for hackers when it comes to broadcasts’ piracy, access to confidential data, discrediting of the host nation through targeted attacks. Channel broadcasts, betting platforms and selling of online tickets are targets easy to hit: an analysis of Stormshield. [...]
Infiltration procedures in everybody’s privacy are justified with worries about national security: who benefits from these regulations?
PSD2, GDPR, NIS, PCSI DSS and CSP: the financial sector is extremely regulated but, according to ABI Lab, in 2017 investments on IT security of banks and financial institutes were overtaken by initiatives of mobile and digital payment. A real paradox.
Le nec plus ultra pour les connexions via câble : FRITZ!Box 6590 Cable Wi-Fi intelligent et ultra rapide avec une excellente couverture Solution complète pour l’utilisateur qui souhaite utiliser la ligne internet en branchant directement son routeur Disponible dès maintenant, auprès des opérateurs sélectionnés Les réseaux câblés jouent un rôle important parmi les [...]
The Android Malware Report traces lines of what it might be a mobile catastrophe. In the first quarter of 2018, analysts discovered 846,916 new Android malware samples. Around 12 percent more than in the first quarter of the previous year. For 2018 as a whole, the G DATA [...]
It just so happens that the Star Wars saga (at least Episode IV-VI) is a textbook example of how not to handle what is basically a data breach. The Empire is, to put it mildly, woefully unaware of how data security works, resulting in less than ideal reactions in [...]