Material
The digitalisation of processes and information is on the rise. But while this can be beneficial, it also comes with some side effects - cybercriminals are becoming more aggressive, gaps in security are being detected and exploited more frequently, and technologies are growing more sophisticated.
Start increasing your level of security awareness with our informational material on topics such as deepfakes. You can find more resources below.
Resources for you to download
Having a good awareness of information security and data protection is incredibly important in protecting yourself from cyberattacks. This includes not only strong passwords and online data minimisation but also an awareness of more modern threats and risks such as doxing, Ransomware as a Service or IoT technologies, for example. Because one thing is certain – the weakest point in the information security chain is and remains the human being.
There are many ways to take preventive action: further training, education, and individual safeguarding. With our free downloadable information, our goal is to help you achieve a better level of security before it's too late. So feel free to browse our resources - knowledgeable tips, tricks & measures to protect yourself as well as educational information on various cybersecurity topics await you.

Poster
Cybergrooming Poster
A seemingly innocuous chat on a messenger app or social media can disguise a hidden threat to children. Use our poster to learn how to recognise the warning...

Ebook
Deepfake Ebook
Let’s be honest, almost all of us have uploaded a picture of ourselves to some app to see what we'll look like in 30 years, or with another...

Poster
Detecting Phishing Emails
Cybercriminals are getting better and better, and so are their social engineering attacks and the methods that go with them to steal sensitive information from...

Ebook
Doxing
Social engineering attacks can take place in many ways. Even the data you voluntarily disclose online can become a threat - the talk of...

Poster
Cloud Security
With the onset of the Corona pandemic and the resulting increase in remote working conditions, the use of cloud storage services has also...

Ebook
Case Study 2021
For over 20 years we have been - according to Bruce Schneier - in the third semantic wave of cyberattacks. Time and again with the goal of targeting human...

Ebook
CISO vs DPO
Data protection exists to protect everyone's data from misuse. Information security makes technical and organisational...