Security

30. September 2020
beitragsbild_wp

How I was able to easily encrypt a confidential message

We have all been in contact with some kind of encryption.Be it as a child with the invented language “Grüfnisch” or as a smartphone user with an end-to-end encrypted message service. You can find out where encryption originated, what encryption methods there are and where they are used today. Sinifiply […]
3. April 2020
A man in a mask in front of a screen, symbolizing a cyber criminal

How to protect yourself from cybercriminals in home office

Phishing, whaling, CEO Fraud. All words that have appeared in other blog posts. But in the times of home office they take on a new meaning. Imagine that you receive an email from your boss asking you to transfer a large amount of money to a bank account. You can’t […]
11. March 2020
Schloss mit einem Kabel

The lessons of the crypto leak from Crypto AG

5. February 2020
Send e-mail via TLS.

Email via TLS are secure! Misconception or truth?

Once upon a time there was a milk technologist, he had just produced a new type of cheese, the Frama-Cheese. He produced it in his dairy and wanted to sell the cheese all over the world. He was aware that his cheese should remain unique so that he could continue […]
27. November 2019
Multiple gears on a background of network connections. This image symbolizes automated security.

Frama RMail Update: make security simpler with security automation

Over the past year’s technology improved and helped us to make our daily life simpler. On the other hand, more laws have been introduced to protect data privacy. Therefore, data security is key for may companies. But how can you make security simpler? The answer is security automation.
20. November 2019
Fischernetz, in welchem Fische gefangen sind. Dies symbolisiert Phishing-Attacken.

Phishing & Whaling Attacks: How to protect yourself against it

When talking about phishing & whaling, many people think of fishing, sea, wind and adventure. Hardly anyone thinks in the other direction: fishing and catching. In the IT world, phishing & whaling have more to do with the last-named. In this article, we explain the difference between phishing and whaling […]
13. November 2019
Laptop in a dark room with code on the screen.

IT security starts with the employee

A hacker attack shuts down your entire IT infrastructure – a nightmare for every company. But how can you prevent such attacks? We have compiled the most important rules for IT security at the workplace for you.
6. November 2019
Umgekipptes Sparschwein, bei dem die Münzen aus dem Bauch rausfallen. Dieses Bild symbolisiert den finanziellen Verlust bei CEO Fraud.

Human Error, CEO Fraud & What You Can Do Against It

You receive an e-mail from your alleged boss asking you to transfer a large sum of money to a specific account. The transaction should be carried out quickly and remain secret. You transfer the money and it is in the hands of criminals. That’s CEO fraud, triggered by human failure […]
9. May 2019
TLS 1.2 email encryption according to GDPR

Solving the encryption issue with TLS 1.2

Many, many software service sales professionals throw around security phrases to make cyber security sound simple. Today, as technologies advance and threats get ever more sophisticated, encrypting email for privacy compliance is not getting simpler.
15. June 2018
Die Zukunft der E-Mail in Unternehmen - Future of email in Business

The Future of E-Mail – Some Thoughts and an Outlook

Electronic Mail, invented in the last century, has still its place in today’s business and private world. But one thing is for sure – E-Mail urgently requires an update in terms of functionality, compliance and security.