Category Archives: Opinion

Amnesty for passwords

The password, once highly acclaimed as a security precaution, can no longer provide what it once promised. As technology constantly evolves, cyber-criminals also refine their tactics. Simple password protection is facing increasingly sophisticated threats, and can be rapidly bypassed, especially … Continue reading

Twitter does away with passwords – but at what price?

The Twitter microblogging service recently declared war on passwords. Rather than having to remember dozens of different passwords, users can now authenticate themselves via the “Digits” service (a social sign-in) when using an app. They have to supply their mobile … Continue reading

Do you also suffer from FOMO?

A much-cited flood of information assails Internet users from all directions when they get stuck into it. Via social networks, like Facebook, tweets, blogs, video platforms, such as YouTube, and as images in Flickr collections – the possibilities seem endless. … Continue reading

Secure contactless authentication via NFC

Near Field Communication, or NFC for short, has been increasingly making a name for itself: near field communication over short distances using wireless technology has already been introduced in contactless payment systems, for example. The new iPhone 6, and its … Continue reading

Bye bye database – or: why size isn’t everything …

Almost all companies have their own databases. And sometimes you may get the impression that size really matters! The bigger the database, the prouder the company management. But as is so often the case in life, size isn’t everything. In … Continue reading

Secure your network communications against the secret services

The political relationship between Germany and the USA is in a crisis. Just recently the media reported on a BND employee who is said to have been working as a double agent for the CIA. The Federal Republic drew their … Continue reading

More branched, faster, more virtual – but are future IT networks also safer?

At the start of each year, predictions for the next 365 days are always popular. This also applies to the IT sector. For 2014, experts attached particular significance to the topics of virtualisation, cloud computing, network optimisation and Software Defined … Continue reading

If even a five-year-old can crack the Xbox password security…

…how much damage could a professional hacker do in a company network? At just five years of age, Kristoffer von Hassel recently caused a stir when he effortlessly circumvented the Microsoft Xbox console’s password security. He wanted to log in … Continue reading

Only once in a blue moon

So the IT Manager is safe in the knowledge, as s/he’s tucked up in bed, that all is well at the office! And yet if we were to stop and ask who has access to the network, to the office … Continue reading

Managing your online identity

Businesses are becoming increasingly concerned with the amount of personal and company data that is available to government authorities. And with good cause; unbeknown to many business leaders and employees, it is possible for government organisations to access business data … Continue reading