Evolution of Protection Goals

Protection Goals: CIA and CIAA

Protection Goals: CIA and CIAA Management Summary The traditional protection goals of information security are confidentiality, integrity and availability. These three protection goals are often referred to as the CIA triad (owing to the initial letter of the respective goals). Meanwhile, another protection goal has gained in importance. First mentioned by the BSI as a[…]

10 Points Plan against Ransomware

10 Points Plan against Ransomware You have heard about Cryptolocker Infection over the news? In this article you can learn more about this type of malware and receive tips and suggestions on how to protect your company against Ransomware. Reading time 5 minutes. What is Ransomware? Over the past few years, we have witnessed the[…]

Cybersecurity Glossary

In an increasingly interconnected world where societies depend on digital infrastructure, cyber security is becoming increasingly relevant. The fact that data breaches are becoming increasingly frequent and hacker attacks on power suppliers are successful shows the impact that insufficient cyber security can cause. In this glossary you will find a condensed overview of the most[…]

Ransomware Protection

Proactively against infection – with EOS & Zerto Ransomware attackers are increasingly targeting companies, the “big shots”. NAS and mass storage devices are purposely encrypted to extort high ransoms. Proactive defense and protective schemes are better than reactive measures after an incident because: Encrypted data is sometimes non-recoverable. Many victims report that decryption is not[…]