Blog EN

free data pro­tec­tion awa­re­ness trai­ning contents

More and more often we are asked how to train data protection and the requirements of the GDPR. For internal data protection officers (DPOs) or, if you don't have a DPO, for the internal data protection contact person, there are numerous training courses and courses for further training in the GDPR requirements. However, familiarization [...]

GDPR “What and How” Work­shop — SEC4YOU Pre­sen­ta­ti­ons as Review

The inventory of processing activities according to Article 30 (without sound). Video presentation of our GDPR workshop in Vienna on November 7, 2017. This video is the presentation recording of our GDPR "What & How" customer event held in Vienna on November 7, 2017. Learn with the video the important features of a register [...]

By |2024-04-19T18:38:44+02:0026.01.2018|Blog EN, Data protection|

Secu­re Design — Secu­ri­ty Architecture

Information security has entered everyday life. Many are now familiar with techniques such as two-factor authentication, encryption and software updates thanks to the devices and social media platforms they use. When it comes to the innards - that is, secure design - many questions remain. What goes on in modern processors these days is difficult [...]

By |2022-11-06T09:57:48+01:0013.01.2018|Blog EN|

Glea­nings: GDPR Work­shop — The Direc­to­ry of Pro­ces­sing Acti­vi­ties with Template

Due to the great demand of our customers and interested parties on the topic of GDPR and Directory of Procedures, SEC4YOU offered a GDPR workshop in November 2017, which specifically highlights the implementation of GDPR measures and offers affected companies the opportunity to start directly at the workshop with the measures or to support [...]

By |2022-11-06T09:58:15+01:0013.11.2017|Blog EN, Data protection|

HR as a gate­way for attacks: The HR depart­ment has no firewall

Cyberattacks proceed just as they did in the analog world over 100 years ago. They are based on communication and knowledge of confidential information. While applications, networks and other technical details are always the subject of intense discussion in the Internet age, people forget about the parts of information security that have little or no [...]

By |2024-04-19T18:38:44+02:0002.09.2017|Blog EN|

Secu­ri­ty Pen­Test of the net­work infrastructure

The digital infrastructure - the IT network - is the basis for daily work in companies and entertainment at home. As long as everything works, nothing is usually questioned. But when problems occur, it is long too late. Despite several decades of development in system administration and information security, security tests still find weak points [...]

By |2022-11-06T10:00:07+01:0023.07.2017|Blog EN|

Bit­Lo­cker encryp­ti­on in terms of GDPR

We are pleased to announce the new "Guide to the use of endpoint encryption with Microsoft BitLocker in terms of the GDPR". The SEC4YOU guide looks at the requirements of the European General Data Protection Regulation (GDPR) and provides concrete recommendations for client deployment. From the content Evaluation of protection goals for BitLocker (BL) - [...]

By |2022-11-06T10:00:24+01:0003.07.2017|Blog EN, Data protection|

Semi­nar: IT Secu­ri­ty / Infor­ma­ti­on Secu­ri­ty on 13–14 Nov. 2017

AIR will host a seminar titled "IT Security / Information Security" from November 13-14, 2017 in Vienna focused from an audit perspective. Seminar topic: IT security is very often understood as technical measures that are intended to selectively address specific vulnerabilities. From the auditing point of view, these measures are part of a superordinate internal [...]

By |2022-11-06T10:00:43+01:0025.06.2017|Blog EN, Events|

Back­up effec­ti­ve­ness in the age of cybercrime

Hard to believe, but there are other aspects of information security than NSA espionage, Russian/Chinese hacker groups and Turkish cybercrime activists. Everyone should still remember the basic pillars of IT security (currently in German "Informationssicherheit"), which focus on the protection goals of confidentiality, availability and integrity. Today, unfortunately, driven by the media, we only ever [...]

By |2022-11-06T10:03:08+01:0028.02.2017|Blog EN|
Go to Top