Is there an alternative to the expensive MS Office programs?

2022-06-03T12:50:23+02:00

As a free alternative, the open source program Apache OpenOffice has proven itself for many years. OpenOffice offers, like Microsoft Office various programs for word processing, spreadsheet, presentation and a database program.

Is there an alternative to the expensive MS Office programs?2022-06-03T12:50:23+02:00

Beware of a new wave of attacks via phishing emails with the subject: “You have received a file via WeTransfer”.

2022-06-03T12:08:51+02:00

It remains exciting and the attacks are becoming more and more sophisticated. In the past, we received phishing emails from unknown senders in poor German or English. Nowadays, they are from known senders with halfway comprehensible content in the subject line.

Beware of a new wave of attacks via phishing emails with the subject: “You have received a file via WeTransfer”.2022-06-03T12:08:51+02:00

How can attackers compromise the IT infrastructure from the outside?

2022-06-03T11:57:10+02:00

A typical attack on the IT infrastructure of companies is carried out in 3 steps. Search for vulnerabilities Attackers first look for vulnerabilities in the system. This can be unbiased emails to employees, e.g. an inconspicuous invoice email to the accounting department. Network printers with open ports, IoT devices with old firmware or even routers whose known vulnerabilities have not been closed. In addition, danger can come from websites that have already been infected with malicious code and whose operators do not have enough resources to constantly pay attention to the security of their own websites. Once the malicious code has [...]

How can attackers compromise the IT infrastructure from the outside?2022-06-03T11:57:10+02:00

Should you encrypt emails?

2022-06-03T11:47:39+02:00

Yes, because e-mails offer the same protection against "reading" as the good old postcard. If you want/need to send really confidential data, such as business data, by e-mail, you cannot avoid encryption. The following options are available to protect messages/documents. Password-protected files: You can of course put the data in a password-protected file and then attach it to the e-mail. The only thing is that it is not very convenient to use and confidential things written in the message can still be read. The password should at least be sent by another means (messenger, telephone, etc.) and not by e-mail. PGP [...]

Should you encrypt emails?2022-06-03T11:47:39+02:00

Are there any free CAD programmes?

2022-06-03T11:43:56+02:00

Yes, one of the best known is the open source programme "FreeCAD". With FreeCAD you can create both 2D and 3D drawings. It is customisable, scriptable and extensible. With its extensive features, it is suitable for hobbyists/makers, experienced CAD users and also educators. For an introduction to FreeCAD we recommend our book: "FreeCAD – 2D/3D Konstruktion – Das Einsteigerseminar".

Are there any free CAD programmes?2022-06-03T11:43:56+02:00

How can I protect my computer if a targeted attack overcomes the firewall and virus scanner?

2022-06-03T11:40:20+02:00

Not at all! That doesn't sound good, but it corresponds to reality. There is software, e.g. from the NSO Group from Israel, which is specialised in penetrating foreign systems. If a targeted attack is made on a specific device, no antivirus programme can defend itself against it. Antivirus scanners work with signatures of known malware. In the case of a new, as yet unknown attack scenario, they cannot prevent the attack because there is no signature for it in their database This is where endpoint security comes in. If attackers succeed in getting onto their target's system, the infected malware must [...]

How can I protect my computer if a targeted attack overcomes the firewall and virus scanner?2022-06-03T11:40:20+02:00

How can we implement OKRs (Objectives and Key Results) in our company?

2022-06-03T11:34:04+02:00

The OKR leadership model, which is particularly popular with start-ups, is quickly explained and easy to understand (or so the theory goes). The company defines a mission (objectives) and then defines milestones or key results to achieve the company's goal. Simple to explain, difficult to implement! The difficulty for most young companies and start-ups is not to lose focus in the initial phase and not to be distracted from the goal while building up the learning curve. We recommend a very good book on this topic that explains the path and implementation of OKR in a practical way using a fictitious [...]

How can we implement OKRs (Objectives and Key Results) in our company?2022-06-03T11:34:04+02:00
Go to Top