Receive the German-language trade magazine "organisator" in the IT-Security/2008 issue as a PDF download with the following table of contents:
IT-SECURITY '08 CONTENT
Cybercrime and e-banking paradigm shift
The Internet has become a fundamental tool for the functioning of entire economies. Nevertheless; less efficient means are available on the Internet to enforce the rules of the game.
IT security in SMEs is a hot topic: the increasingly complex and frequent Internet threats are often countered by a lack of resources or a lack of risk awareness.
Access_Management I know. that I am me
Secure access to data, applications and network resources is a concern in many places. For example, the well-known security risks associated with the use and management of login data cause considerable problems. This does not have to be the case.
Awareness Nothing for single fighters
It is well known that information security also includes soft factors. But when it comes to concrete measures to educate and sensitize employees, there are still difficulties. Is this due to a limited budget or a lack of creativity?
PORTRAT
SOLVIS Ltd. SOLVIS, a specialist for i AM and workflow, was founded in early 2002 in Basel-Stadt as a public limited company by five entrepreneurs and is still run as a "family business by the founders. "
Würth iTensis AG
Würth ITensis has many years of expertise in the operation of IT infrastructures and applications, state-of-the-art data centers and offers customized service management and IT outsourcing.
SUBJECT REPORTS
Certificates More security for the internet user
A small padlock symbolizes to the Internet user that he is supposedly on a secure website - but which user pays attention to this? Criminal organizations take advantage of this. Unsuspecting, the user reveals his identification and password.
PhysicalSecurity The IT Security Space
If you look at IT security from a holistic angle, you immediately realize that it goes far beyond purely technical security. In addition to firewalls and storage concepts, protecting IT structures from physical threats is immensely important.