What is the Cloud Computing Compliance Criteria Catalogue?

What is the Cloud Computing Compliance Criteria Catalogue?

  • Security

Huge amounts of highly sensitive and personal data are stored in the cloud every day. That’s why it’s all the more important that cloud services providers are subject to strict security standards to ensure that this data remains protected. The BSI (Federal Office for Information Security)’s Cloud Computing Compliance Criteria Catalogue (C5) specifies and standardises these security requirements.

What is the Cloud Computing Compliance Criteria Catalogue?
WLAN security: the best protection for your networkwk1003mikeShutterstock

WLAN security: the best protection for your network

  • Security

When you’re travelling with portable devices, you’ll find public WLAN everywhere, giving you access to the world wide web. Even in residential and work spaces, practical wireless networking is widespread. It’s easy to forget that there’s a risk involved when transferring data using one of these access points. In the following article, we explain the biggest security risks and show you how to make…

WLAN security: the best protection for your network
What is malware?

What is malware?

  • Security

Worms, viruses, and Trojan horses are examples of viruses that infiltrate systems and carry out undesirable actions. Collectively, these are referred to as ‘malware’. In this guide, we’ll explore the various types of malware, understand the differences between them, and take a look at past and present types of malware.

What is malware?
What is WannaCry ransomware?

What is WannaCry ransomware?

  • Security

In 2017, WannaCry wreaked havoc on global authorities, corporations, and individuals in a matter of days. The ransomware exploited a Windows vulnerability, resulting in billions of dollars in damages. In this article, we’ll delve into WannaCry, its mechanics, and provide essential tips to safeguard against this extortion scheme.

What is WannaCry ransomware?
How to remove ransomware

How to remove ransomware

  • Security

If cybercriminals encrypt your entire system or specific files, and then demand a ransom for decryption, it is imperative that you do not pay. Instead, there are effective methods to remove ransomware, and we’ll outline them in this article. Furthermore, we’ll provide guidance on protecting yourself against potential future infections.

How to remove ransomware
What is ransomware and how can you protect yourself?

What is ransomware and how can you protect yourself?

  • Security

When a ransomware attack occurs, cybercriminals block access to important files by encrypting them and demand that a sum of money be paid in order to restore access. In this article, we’ll cover what ransomware is, how you can protect yourself from it, and how to identify if your device has been infected. We’ll also take a look at some examples of notorious ransomware attacks.

What is ransomware and how can you protect yourself?
How to detect and remove Trojans

How to detect and remove Trojans

  • Security

In an ideal world, Trojans are removed before the malware can cause major damage. But detecting a well-disguised Trojan isn’t easy. Apart from the usual signs of a Trojan infection, antivirus programmes and malware tools are the best way to reliably detect and remove Trojans. But which steps should you follow? Find out here.

How to detect and remove Trojans
What are Trojans and how can you protect yourself from them?

What are Trojans and how can you protect yourself from them?

  • Security

Trojans disguise themselves as useful programs to get onto a computer or smartphone unnoticed. Once installed, a Trojan can perform malicious activities like collect data, steal passwords, or remotely control the device. Unlike viruses, Trojans don’t spread by themselves, but need to be installed first. Here’s how you can prevent this.

What are Trojans and how can you protect yourself from them?
How to secure your files before Amazon Drive is discontinued

How to secure your files before Amazon Drive is discontinued

  • Security

The global market leader Amazon announced that it will discontinue its cloud service Amazon Drive at the end of 2023. This means that users must download their online files and back them up elsewhere before then. In this article, we’ll explain how to manage files stored in Amazon Drive and provide you with helpful instructions for transferring your data to a different cloud storage provider, such…

How to secure your files before Amazon Drive is discontinued
How to uninstall Kaspersky step by step

How to uninstall Kaspersky step by step

  • Security

More and more users are asking themselves whether they should remove Kaspersky’s antivirus software from their computers. Have you decided to uninstall Kaspersky? We show you how to remove the program in Windows, Mac, and using a removal tool.

How to uninstall Kaspersky step by step
In order to provide you with the best online experience this website uses cookies. By using our website, you agree to our use of cookies. More Info.
Manage cookies