Emergency Concept For Cyberattacks – The 7 Most Important Steps
A careless click on an attachment from a spam email, lack of two-factor authentication or ...
The 6 Biggest Cybersecurity Risks For Swiss SMEs
In recent years in particular, Swiss companies have shown how flexible, modern and ...
Microsoft And Data Protection – This Is How Secure MS Teams Is
The days of face-to-face meetings, shared offices and fixed working hours are over for ...
Microsoft OneNote: The Notebook That Can Do Everything
Notepads are incredibly important in everyday work. For example, when a location, ...
OKR – The Agile Employee Management Method
Do you know OKR? This abbreviation stands for the management method “Objectives and Key ...
New Work: The Big Opportunity For SMEs
The way we work has changed a lot in the last 50 years. Developments in the wake of the ...
Blockchain – The New Future Of Cybersecurity?
With the emergence of cryptocurrencies such as Bitcoin, the term blockchain has also ...
What’s in our Managed Services
Advancing digitalization is leading to increasing dependence on IT. However, in-house IT ...
Cybersecurity Awareness Trainings: Why They Are So Essential
The days of storing all information on the hard drive in the office computer are long ...
A standard procedure for AI projects in the SME environment
The following blog post was written by Michael Hausmann as part of the certificate thesis ...