by admin | Dec 12, 2023 | Cybersecurity
IT security concepts: Why every company needs it Reading time: 8min | Author: Joshua Wiesner | 20.09.2023 3 Article content What is an IT security concept? Which companies need an IT security concept? How does the development of an IT security concept proceed? What...
by admin | Dec 11, 2023 | Cybersecurity
How penetration testing can save your company from disaster Reading time: 8min | Author: Joshua Wiesner | 02.07.2023 3 Article content Business owners who have ever been the victim of a hacker attack know the feeling of powerlessness when any help comes too late and...
by admin | Aug 15, 2022 | Cybersecurity
What is Endpoint Security? reading time: 4min | Author: Lukas Dubiel| 15.08.2022 Home » IT-Blog » What is Endpoint Security? Content of the article How does Endpoint Security work? Why is endpoint security so important for businesses? What protection mechanisms are...
by admin | May 24, 2022 | Apple & Enterprise
BYOD | Everything you need to know about “Bring Your Own Device” in the company reading time: 2min | author: Lukas Dubiel| 19.05.2022 Home » IT-Blog » BYOD | Everything you need to know about “Bring Your Own Device” in the company Content of...
by admin | May 2, 2022 | Apple & Enterprise
Fleetsmith is getting shut down – What alternatives are there and how can the changeover succeed? reading time: 2min | author: Lukas Dubiel | 02.05.2022 Home » IT-Blog » Fleetsmith is getting shut down – What alternatives are there and how can the...