Featured Cybersecurity-Know-how für Geschäftsführende. Teil 4.1: Cybersecurity strategisch betrachten.

Published on September 7th, 2021 📆 | 8023 Views ⚑

0

Cybersecurity-Know-how für Geschäftsführende. Teil 4.1: Cybersecurity strategisch betrachten.


iSpeech.org

IT Security - Sep 7, 2021


Cybersecurity-Know-how für Geschäftsführende. Teil 4.1: Cybersecurity strategisch betrachten.

This page is not currently available in the selected language.

Managing Director

E-Mail: martin.seeger@bechtle.com

In the eyes of the law, overall responsibility lies firmly at the feet of executive management, who have to make sure their businesses' IT security is at the cutting edge. But what does 'cutting edge' mean and what are the the most important steps to take? Join us for the next part of our cybersecurity series to find out (German language only).

Please allow cookies to see content from Youtube.

We use Youtube to embed video content on our website. This service may collect data on your activity. For more information, please go to the settings page.

Published on Sep 7, 2021.

03Aug

Cybersecurity expertise for managing directors. Part 3: Liabilities and obligations.

The damage caused by cyberattacks is growing worldwide, but the risk of falling victim to cybercrime has specifically increased in Germany. According to the Munich Re Global Cyber Risk and Insurance Survey, the average cost of ransomware attacks is around 280,000 USD per case-and that figure does not even include potential ransom payments. When damage is caused, someone has to take responsibility, especially in a worst case scenario.

20Jul

Cybersecurity expertise for managing directors. Part 2 - Darknet dangers!

Reports on hacker attacks are starting to make it into main news bulletins with criminals becoming ever more professional and targeted in their attacks, true to the motto 'the greater the damage, the higher the ransom'. Ransomware attacks which see data being stolen and encrypted are commonplace and when people question where these attacks are launched from, discussions seem to focus on the darknet.

15Jul

Microsoft Exchange Server - Critical vulnerabilities patched.

Participants in the 2021 Pwn2Own hacking contest have identified previously unknown vulnerabilities in Microsoft Exchange Server, including remote code execution, privilege escalation, and information disclosure flaws. Microsoft has already published security updates to resolve these issues.

15Jul

Advanced Persistent Threats - The unknown menace.

Advanced Persistent Threats, or APTs, are a multi-layer, sophisticated form of attack that a growing number of businesses are becoming acquainted with. Experts are clear. Anyone can be impacted. To make sure you don't fall victim yourself, we've put together some detailed information on this often underestimated attack scenario and explain how it unfolds. We'll also give you some tips on how to protect yourself and what to do if the worst comes to the worst.

07Jul

Cybersecurity expertise for managing directors. Part 1 - Cybercrime in Germany.





The number of IT security risks facing SMEs has risen considerably over the last few years and there's no end in sight with the number of security incidents and their impact contributing to this development. At the same time, the IT security solutions market is growing as dynamically and not without reason, as there is immense pressure on owners and managing directors of SMEs to keep pace.

05Jul

Critical security vulnerability in the Windows Print Spooler service - We're here to help.

An exploit code is currently doing the rounds that is capitalising on an as-yet unresolved security vulnerability in many Windows versions. A patch has not yet been made available. The issue affects the Windows Print Spooler. According to current information, all Windows versions from 7 SP1 to Server 2019 are impacted. The exploit enables malicious code to be run with system rights and, if this happens on a domain server, attackers could spread throughout the network and infect other computers with malware.

01Jul

From an IT security assessment to an IT security roadmap - How to successfully redesign the IT landscape.

The coronavirus pandemic has seen the digital transformation really take off at German companies, driven by those sitting at the top tables. However, these are the same people who are responsible for IT security, so how can companies adapt their IT landscape to current security requirements?

08Jun

Advanced persistent threats - Responding to sophisticated attacks.

Power stations, registration offices and innovative SMEs are rewarding targets for hackers and attacks on critical infrastructure can have severe consequences including power cuts, stolen data, industrial espionage. To stop attacks in their tracks, Bechtle's experts work around the clock to protect your IT systems. If there should be a security incident however, it pays to be quick out of the blocks and as a qualified APT response provider, this is where we come in. Read on to find out how we can help you defend yourself against advanced persistent threats and how these attacks unfold.

More posts

Disclaimer

Bechtle AG published this content on 07 September 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 07 September 2021 08:11:06 UTC.

© Publicnow 2021

All news about BECHTLE AG

Analyst Recommendations on BECHTLE AG

Sales 2021 6 385 M
7 577 M
7 577 M
Net income 2021 222 M
263 M
263 M
Net Debt 2021 52,1 M
61,8 M
61,8 M
P/E ratio 2021 36,0x
Yield 2021 0,81%
Capitalization 8 041 M
9 539 M
9 543 M
EV / Sales 2021 1,27x
EV / Sales 2022 1,14x
Nbr of Employees 12 421
Free-Float 65,0%


Duration :


Period :

Bechtle AG Technical Analysis Chart | MarketScreener

Technical analysis trends BECHTLE AG

Short Term Mid-Term Long Term
Trends Bullish Bullish Bullish

Income Statement Evolution

Sell

Buy

Mean consensus OUTPERFORM
Number of Analysts 8
Last Close Price
63,82 €
Average target price
62,96 €
Spread / Average Target -1,34%

Source link

Tagged with:



Comments are closed.