SHOW ALL POSTS
13.04.2022 By Tobias Dieter
Well, did I get your attention? Would you have clicked a big button saying ‘read more here’ if it had been placed under this headline? In my blog post, you’ll learn more about some of the methods that are used to digitally manipulate millions of people every day. I’ll explain to you the risks hidden behind these kinds of messages, what’s meant by the terms ‘clickbaiting’ and ‘hoax’ and how you can expose falsehoods and increase your awareness.
26.07.2021 By Philipp Latini
Digitalisation and cross-hospital and cross-network working are of utmost importance in the hospital world. Above all, it is essential to comply with the requirements of the General Data Protection Regulation (GDPR). In this blog post, we explain how this can be achieved and describe the solutions we offer to support hospitals.
10.02.2021 By Arman Kohli
In IT, IT service management (ITSM) is mainly concerned with optimising the quality of IT services. Practice has shown that optimising security management is often more effective at improving information security in the longer term than investing in security technology is. As the focus on ITSM has increased in the IT environment, I’m going to use this blog post to explain how performance measurement and security costs are related in this context.
25.01.2021 By Arman Kohli
The security of IT services is always changing Continuously developing an information security management system (ISMS) based on existing standards and tailored adjustments can lead to the information being used securely in the long term. That’s why in this blog post, I explain what’s behind each of the standards in the ISO 2700x series and put them to the test.