Phish in a Barrel – What users don’t know about cyber threats – and why it can hurt them

What users don’t know about cyber threats —and why it can hurt them This e-book explores real-world attacks that reveal users’ dual role as top targets for attackers and frontline defenders. They span five major categories of cyber attacks and other cyber crime that began with—or hinged on— compromising users: We also include select findings…

Read More

Kompromittierung und Übernahme von Cloud-Konten

Cloud-Kontenkompromittierung ist die böswillige Übernahme eines legitimen Anwenderkontos bei einem Cloud-basierten E-Mail- oder einem Collaboration-Dienst. Damit erhalten die Angreifer weitreichenden Zugriff auf Daten, Kontakte, Kalendereinträge, E-Mails und andere Systemtools. Neben den kompromittierten Anwenderdaten können die Angreifer das Konto auch zur Nachahmung des Anwenders per Social Engineering oder bei BEC-Angriffen (Business Email Compromise, auch als Chefmasche…

Read More

The Business Value of Dell Technologies APEX as-a-Service Solutions

Did you know APEX as-a-service solutions from Dell could help you lower your annual infrastructure costs by 39%? Organisations are focussing on resiliency of their digital infrastructures to deliver the richer levels of visibility, data management, and protection that customers expect nowadays. Using a consumption-based model through a partner or vendor can help achieve this….

Read More