Everything about IT Security

avatar photo
Wednesday, April 09 2025 / Published in Efficiency, Safety
Data is growing faster than many companies can imagine. But when does this growth become a real problem? How can companies design their IT infrastructure to keep pace with the exponential increase in data? The answer lies in a clearly structured data usage concept (DNK). In this article, we will show you how
avatar photo
Wednesday, April 09 2025 / Published in Compliance, Data Management, data migration, Efficiency, Safety, Webinar
The next topics are "Data Usage Concept" on May 06.05, "Compliance and Collaboration" on May 27.05, and "Cost Trap SharePoint" on July 01.07. Register now for free!
avatar photo
Monday, April 07, 2025 / Published in Compliance, Safety, Video, Webinar
Active Directory is the heart of many IT infrastructures – yet in many companies, the structures that have evolved resemble a "digital spaghetti plate" rather than a properly maintained directory. The webinar focused on typical challenges in managing groups, permissions, and responsibilities. The consequences are security risks, inefficient administrative processes, and a lack of overview. In the product webinar on April 1, 2025
avatar photo
Tuesday 01 April 2025 / Published in Knowledge, Safety
The question is not if, but when your company will become the target of cyberattacks and internal security threats. Yet, very few companies are prepared for this emergency. Many companies struggle with confusing authorization structures, outdated group memberships, and a lack of transparency. This not only leads to security gaps, but can also cause compliance problems. This is where the principle of
avatar photo
Wednesday, March 05, 2025 / Published in Safety
The webinar on February 25, 2025 offers valuable insights into the challenges and solutions surrounding IT security in Active Directory (AD) and on the file server. The hosts were Jan Engelmann and Thomas Erlbacher, who used their experience to present practical analyses and optimization strategies. The main content can be summarized as follows: The most important content
avatar photo
Friday, February 28, 2025 / Published in Data Management, Safety
Labeled wooden blocks DATABREACH
How to ensure the security of your Active Directory. Active Directory (AD) is an often underestimated, yet extremely critical component of the IT infrastructure. In many companies, it has grown, expanded, and adapted over the years – becoming increasingly complex and confusing. What at first glance appears to be a purely technical problem is, in fact, a
avatar photo
Thursday, February 13, 2025 / Published in Best practices, Safety
How should you manage permissions on Microsoft file systems? A question that comes up again and again. Actually simple but highly controversial. We clarify.
avatar photo
Thursday, 28 November 2024 / Published in Data Management, Safety, Uncategorized
Recognize and eliminate the dangers of unchecked data growth. The question is not if, but when your company will become the target of a cyber attack. Despite this, many companies are inadequately prepared for the worst-case scenario. A major gateway is confusing authorization structures as a result of constantly growing data volumes. Security gaps such as orphaned employee accounts, incorrect and excessive authorizations outside of the "least privilege" principle also remain in confusing