Explore Our Explore the Evolution of Our Journey
Blog’s Archives
Scroll Down
Cybersecurity at a glance
Cybersecurity at a glanceReading time: 7min | Author: Lukas Dubiel| Last updated on 14.07.2024 Content of the article What...
Email security – How do I protect my email inbox?
E-Mail Security - How do I protect my e-mail inbox?Reading Time: 4min | Author: Lukas Dubiel| 05.09.2022 Start » IT-Blog » Mail Security - How do I protect my email inbox? Content of the article Email security: How do I protect my email inbox? What is email security?...
Network Security
Network Security - How do I protect my network infrastructure (in 2022)?Reading time: 6min | Author: Lukas Dubiel| Last updated: 10.03.2023 Start » IT-Blog » Network Security - How do I protect my network infrastructure (in 2022)? Article content What does network...
Cloud solutions for enterprises – The top 5 providers in comparison
Cloud solutions for enterprises - The top 5 providers in comparisonReading time: 5 min | Author: Joshua Wiesner | 06.06.2023[dipi_breadcrumbs bc_home_icon="on" _builder_version="4.27.0" _module_preset="default"...
IT-Outsourcing
IT-Outsourcing - Why leading companies rely on external IT service providers in 2023Reading time: 8min | Author: Lukas Dubiel | 30.03.2023[dipi_breadcrumbs bc_home_icon="on" bc_home_color="#3b3b3b" bc_schema="off" _builder_version="4.19.5" _module_preset="default"...
The need for an IT security concept
IT security concepts: Why every company needs itReading time: 8min | Author: Joshua Wiesner | 20.09.2023[dipi_breadcrumbs bc_home_icon="on" bc_home_color="#3b3b3b" bc_is_post_type_root="on" bc_post_type_root="https://jemix.de/de/blog/" bc_schema="off"...
Penetration Testing
How penetration testing can save your company from disasterReading time: 8min | Author: Joshua Wiesner | 02.07.2023[dipi_breadcrumbs bc_home_icon="on" bc_home_color="#3b3b3b" bc_is_post_type_root="on" bc_post_type_root="https://jemix.de/de/blog/" bc_schema="off"...
What is Endpoint Security? And what does it mean?
15.08.2022 | reading time: 4min
When it comes to protecting endpoints, i.e. PCs, mobile devices, laptops and the like from cyberattacks and malware, …
Everything you need to know about “Bring Your Own Device”
19.05.2022 | reading time: 2min
In the course of advancing digitalization, many companies are focusing on agile and flexible employees…
Fleetsmith is getting shut down. What alternatives are possible?
02.05.2022 | reading time: 2min
Since April 2022, Apple has discontinued the mobile device management service of its subsidiary Fleetsmith…









