The digitalisation of processes and information is on the rise. But while this can be beneficial, it also comes with some side effects - cybercriminals are becoming more aggressive, gaps in security are being detected and exploited more frequently, and technologies are growing more sophisticated.
Start increasing your level of security awareness with our informational material on topics such as deepfakes. You can find more resources below.
Resources for You to Download
Having a good awareness of information security and data protection is incredibly important in protecting yourself from cyberattacks. This includes not only strong passwords and online data minimisation but also an awareness of more modern threats and risks such as doxing, Ransomware as a Service or IoT technologies, for example. Because one thing is certain – the weakest point in the information security chain is and remains the human being.
There are many ways to take preventive action: further training, education, and individual safeguarding. With our free downloadable information, our goal is to help you achieve a better level of security before it's too late. So feel free to browse our resources - knowledgeable tips, tricks & measures to protect yourself as well as educational information on various cybersecurity topics await you.
Cyber Monsters Poster
Malware comes in many forms, and we know how nightmarish it can be. But what other dangers are there lurking in the shadows? To protect yourself against...
Types of Hackers Poster
Many negative connotations are associated with the term “hacker” or “hacking”. We often think of someone who aims to cause damage, extract money...
A seemingly innocuous chat on a messenger app or social media can disguise a hidden threat to children. Use our poster to learn how to recognise the warning...
Let’s be honest, almost all of us have uploaded a picture of ourselves to some app to see what we'll look like in 30 years, or with another...
Detecting Phishing Emails
Cybercriminals are getting better and better, and so are their social engineering attacks and the methods that go with them to steal sensitive information from...
Social engineering attacks can take place in many ways. Even the data you voluntarily disclose online can become a threat - the talk of...
With the onset of the Corona pandemic and the resulting increase in remote working conditions, the use of cloud storage services has also...
Case Study 2021
For over 20 years we have been - according to Bruce Schneier - in the third semantic wave of cyberattacks. Time and again with the goal of targeting human...
CISO vs DPO
Data protection exists to protect everyone's data from misuse. Information security makes technical and organisational...