Knowledge & Practice

Practical knowledge for CISOs, IT managers, and executives

NIS2
NIS2

NIS2 for SMEs: What You Need to Know and What to Do Now

Since December 2025, NIS2 applies in Germany as well. For mid-market companies with 50 or more employees or over EUR 10 million in revenue, this me...

2026-02-01 12 min read
NIS2
NIS2

NIS2 Initial Report to the BSI: Content, Deadlines, and Template

The NIS2 initial report must reach the BSI within 24 hours. This article shows you what mandatory information the report must contain, when an inci...

2026-02-02 10 min read
NIS2
NIS2

NIS2 Reporting Deadlines at a Glance: 24h, 72h, 1 Month — What Is Due When

NIS2 requires three reporting stages for security incidents: initial report within 24 hours, update after 72 hours, and final report after one mont...

2026-02-03 8 min read
NIS2
NIS2

NIS2 Fines: Who Is Liable and How High Are the Penalties?

NIS2 brings significant fines and personal liability for management. Up to EUR 10 million or 2% of global annual revenue for violations. We explain...

2026-02-04 8 min read
NIS2
NIS2

NIS2 vs. ISO 27001: Differences, Similarities, and How Both Fit Together

NIS2 is a law, ISO 27001 is a standard. Both require an ISMS, but with different focus areas. This article shows you where requirements overlap, wh...

2026-02-05 10 min read
ISMS
ISMS

Which Frameworks Do I Need? NIS2, ISO 27001, BSI IT-Grundschutz, TISAX Compared

Six frameworks, six different approaches — but which one do you actually need? This article compares NIS2, ISO 27001, BSI IT-Grundschutz, TISAX, BS...

2026-02-06 12 min read
ISMS
ISMS

Building an ISMS: The Complete Guide for Companies with 50 to 500 Employees

Building an ISMS sounds like a mammoth project. This guide shows you step by step how to introduce an information security management system based ...

2026-02-07 15 min read
ISMS
ISMS

Defining the Scope: What Belongs in the ISMS and What Does Not?

The scope is the foundation of every ISMS. If you define it incorrectly, you are building on sand. This article shows you step by step how to prope...

2026-02-08 8 min read
ISMS
ISMS

Creating a Statement of Applicability (SoA): Selecting and Justifying Controls

The SoA is the centerpiece of your ISMS. Learn how to systematically evaluate ISO 27001 Annex A controls, justify applicability, and document imple...

2026-02-09 10 min read
ISMS
ISMS

Key ISMS Roles: ISM, CISO, Risk Owner – Who Does What?

ISM, CISO, risk owner, asset owner – an ISMS depends on clearly assigned responsibilities. This article shows which roles you need, what each role ...

2026-02-10 8 min read
Incident Response
Incident Response

DDoS Attack Scenario: When Your Website and Services Are No Longer Reachable

The website is down, the customer portal is unresponsive, the phone system is glitching. A DDoS attack takes your public-facing services offline, a...

2026-05-11 17 min read
NIS2
NIS2

NIS2 for Food Manufacturers and Wholesale Distributors

The food industry is classified as a sector of high criticality under NIS2. Cold chains, ERP systems, inventory management, and HACCP interfaces cr...

2026-03-31 14 min read
NIS2
NIS2

NIS2 for the Chemical Industry: Specifics and OT Security

The chemical industry faces unique challenges under NIS2: process control systems that run 24/7, the Major Accident Ordinance (Störfall-Verordnung)...

2026-05-13 14 min read
NIS2
NIS2

NIS2 for Waste Management and Disposal Companies

Waste management is a regulated sector under NIS2 as part of critical infrastructure. Logistics IT, route planning, weighbridge systems, and electr...

2026-05-14 14 min read
NIS2
NIS2

NIS2 for Data Centers and Cloud Providers

Data centers and cloud providers are listed under NIS2 as digital infrastructure in Annex I and thus regulated as essential entities. BSI C5, physi...

2026-05-15 14 min read
NIS2
NIS2

NIS2 for Postal and Courier Service Providers

Postal and courier services are listed as a sector of high criticality in NIS2 Annex I. Tracking systems, logistics IT, parcel lockers, and sorting...

2026-05-16 14 min read
NIS2
NIS2

NIS2 for Water Suppliers and Wastewater Operators

Drinking water supply and wastewater disposal are listed as sectors of high criticality in NIS2 Annex I. SCADA systems, remote control technology, ...

2026-05-17 14 min read
NIS2
NIS2

NIS2 for Research Institutions and Universities

Research institutions face unique NIS2 challenges: open networks designed to enable collaboration, intellectual property that is highly attractive ...

2026-05-18 14 min read
ISMS
ISMS

ISO 27001 A.5.1: Setting Up Information Security Policies the Right Way

Control A.5.1 forms the foundation of the entire Annex A: Without a documented information security policy and subordinate topic-specific policies,...

2026-05-19 16 min read
ISMS
ISMS

ISO 27001 A.5.23: Using Cloud Services Securely

Control A.5.23 is one of the new controls in ISO 27001:2022 and addresses a topic that is already everyday reality for most companies: the use of c...

2026-05-20 17 min read
Richtlinien
Richtlinien

Writing an Information Security Policy: Structure, Content, and Example

The information security policy is the foundation of every ISMS. This guide shows you the structure, mandatory content per ISO 27001, sample wordin...

2026-02-11 12 min read
ISMS
ISMS

ISO 27001 A.5.29-30: Business Continuity in the Context of Information Security

Business continuity management and information security are often treated separately, even though they are inseparable. Controls A.5.29 and A.5.30 ...

2026-05-21 17 min read
Richtlinien
Richtlinien

Creating a Password Policy: Requirements, Example, and Enforcement

A password policy is among the most fundamental documents of any ISMS. This article shows you what BSI and NIST currently recommend, how to formula...

2026-02-12 14 min read
Richtlinien
Richtlinien

Mobile Device Usage Policy (BYOD/MDM)

Mobile devices are indispensable in today's work environment but bring significant security risks. This article explains the differences between BY...

2026-02-13 15 min read
Richtlinien
Richtlinien

Access Control Policy: Physical and Logical

Physical and logical access control form the foundation of every ISMS. This article explains the difference between physical and logical controls, ...

2026-02-14 15 min read
Richtlinien
Richtlinien

Policy Lifecycle: From Creation to Retirement

Writing policies is only the beginning. To remain effective, they need a defined lifecycle: drafting, review, approval, publication, acknowledgment...

2026-02-15 14 min read
Risikomanagement
Risikomanagement

Risk Assessment in the ISMS: Methodology, Matrix, and Practical Example

The risk assessment is the heart of every ISMS. This article shows you step by step how to conduct a qualitative risk assessment with a 5x5 matrix,...

2026-02-16 18 min read
Risikomanagement
Risikomanagement

Risk Treatment: Mitigate, Accept, Transfer, or Avoid

After the risk assessment comes the decisive question: What now? This article explains the four treatment options in an ISMS, demonstrates with pra...

2026-02-17 16 min read
Risikomanagement
Risikomanagement

Top 10 Information Security Risks for Mid-Market Companies

Which information security risks hit SMEs the hardest? This article analyzes the ten most common risks with likelihood, typical impact, and concret...

2026-02-18 20 min read
Incident Response
Incident Response

Detecting, Assessing, and Reporting a Security Incident - The Complete Process

Ransomware encrypts the network, an employee clicks a phishing link, the monitoring system raises an alarm - and then? This article describes the c...

2026-02-19 14 min read
ISMS
ISMS

ISMS in 6 Months: A Realistic Experience Report

A mid-market IT service provider with 100 employees builds its ISMS. This fictional but realistic project report shows month by month what worked, ...

2026-04-09 18 min read
ISMS
ISMS

From Excel ISMS to Tool: Migration Guide Without Data Loss

You're managing your ISMS in Excel spreadsheets and noticing it no longer scales? This migration guide shows you step by step how to cleanly transf...

2026-04-08 16 min read
ISMS
ISMS

Your First 100 Days as a CISO (Information Security Officer): Priorities, Quick Wins, and Pitfalls

You've just taken on the role of CISO (Information Security Officer) and wondering where to start? This article gives you a concrete roadmap for yo...

2026-04-05 17 min read
Datenschutz
Datenschutz

Reporting a GDPR Data Breach: When, How, and to Whom

72 hours. That is how much time you have to report a notifiable data breach to the supervisory authority. This article explains when a data breach ...

2026-02-20 13 min read
ISMS
ISMS

Data Sovereignty in Your ISMS: Why Your Risk Register Doesn't Belong in the Cloud

Your ISMS contains the most sensitive data in your organization: vulnerabilities, risk registers, incident details, audit reports. Entrusting this ...

2026-03-23 12 min read
Datenschutz
Datenschutz

CLOUD Act, Schrems II, and Your ISMS: What You Need to Know About US Government Data Access

The CLOUD Act gives US authorities access to data held by US providers, regardless of where the servers are located. Schrems II blew up the foundat...

2026-03-23 10 min read
ISMS
ISMS

Vendor Lock-in in Compliance Software: How to Keep Control of Your ISMS

Proprietary data formats, missing export functions, opaque contract terms: vendor lock-in is a real risk in compliance software with costly consequ...

2026-03-24 10 min read
ISMS
ISMS

SaaS vs. Self-Hosted: The True Cost of Compliance Software Over 5 Years

License costs are just the tip of the iceberg. This article calculates what SaaS compliance tools and self-hosted solutions actually cost over five...

2026-03-24 12 min read
Audit
Audit

ISMS Audit and Data Storage: Why the Auditor Wants to Know Where Your Data Resides

In the certification audit, the auditor asks not only about policies and processes but also about where your ISMS data actually resides. Cloud sub-...

2026-03-25 10 min read
ISMS
ISMS

Self-Hosted ISMS with Docker: Setup, Backup, and Maintenance in Practice

ISMS Lite runs with a single command on your own server. This article shows you the complete setup with Docker Compose, explains the architecture b...

2026-03-25 12 min read
Datenschutz
Datenschutz

GDPR-Compliant ISMS Hosting: Requirements for Storing Your Compliance Data

An ISMS tool processes personal data: names of risk owners, training participants, auditors. This brings it under the DSGVO (GDPR). This article sh...

2026-03-26 10 min read
ISMS
ISMS

Your Company's Crown Jewels: Why ISMS Data Needs Special Protection

Your ISMS documents every vulnerability, every open control status, and every risk assessment in your organization. For an attacker, that is more v...

2026-03-26 10 min read
Incident Response
Incident Response

Creating an Incident Response Plan: Template and Practical Example

An incident response plan describes who does what during a security incident, in what order, and with what resources. This article provides the com...

2026-02-21 15 min read
NIS2
NIS2

NIS2 and Data Sovereignty: What the Directive Says About Controlling Your Data

NIS2 demands not only technical security, but also sets requirements for control over your data and supply chains. This article shows how data sove...

2026-03-27 10 min read
BCM
BCM

Securing ISMS Data: Backup Strategy for Self-Hosted Compliance Systems

If your ISMS runs self-hosted, you bear the responsibility for data backup. This article shows you how to build a backup strategy for database and ...

2026-03-27 10 min read
ISMS
ISMS

From the Cloud to Your Own Server: ISMS Migration Without Data Loss

More and more companies are switching from cloud ISMS solutions to self-hosted systems. Reasons range from uncontrollable cost increases and compli...

2026-03-28 12 min read
ISMS
ISMS

ISMS Without Cloud Dependency: Why Offline Capability Is Not a Relic

Your auditor is on-site, the Wi-Fi goes down, and your cloud ISMS is unreachable. Or your production environment deliberately has no internet acces...

2026-03-28 8 min read
ISMS
ISMS

Digital Sovereignty for SMEs: More Than a Political Buzzword

Digital sovereignty sounds like EU summits and position papers. But behind it lies a very concrete question for every company: who controls your da...

2026-03-29 10 min read
ISMS
ISMS

ISMS for MSPs: Why Self-Hosted Per Customer Is the Better Architecture

Multi-tenancy sounds efficient — until a single breach affects all customer data. For Managed Service Providers offering ISMS as a service, one ins...

2026-03-29 10 min read
ISMS
ISMS

Encrypting ISMS Data: At Rest, In Transit, and In Backups

ISMS data is among the most sensitive information in any organization: vulnerability analyses, risk registers, audit reports. This article shows ho...

2026-03-29 10 min read
BCM
BCM

Creating a Recovery Plan: Guide with Template for SMEs

A recovery plan defines how you systematically bring business operations back online after an outage. This article shows you the structure, explain...

2026-02-22 14 min read
BCM
BCM

Conducting a Business Impact Analysis (BIA): Evaluating Business Processes

The Business Impact Analysis identifies your critical business processes and assesses the impact of an outage. This article shows you how to conduc...

2026-02-23 15 min read
BCM
BCM

IT Emergency Handbook: Structure, Content, and PDF Template

The IT emergency handbook bundles all the information you need in an emergency: escalation chains, contact lists, reporting paths, and response pla...

2026-02-24 14 min read
BCM
BCM

Planning and Conducting a Tabletop Exercise: How to Test Your Emergency Plan

A tabletop exercise tests your emergency plan without touching any systems. Participants walk through a scenario at the table and uncover gaps that...

2026-02-25 14 min read
BCM
BCM

Backup Strategy and Restore Tests: Because Backups Alone Are Not Enough

A backup without a restore test is a gamble. This article explains the 3-2-1 rule, backup types, retention periods, immutable backups against ranso...

2026-02-26 15 min read
Audit
Audit

Conducting an Internal ISMS Audit: Planning, Checklist, and Report

An internal audit is not a tedious formality — it is your most powerful tool for finding weaknesses in the ISMS before an external auditor does. Th...

2026-02-27 14 min read
Audit
Audit

Management Review per ISO 27001: Agenda, KPIs, and Minutes

The management review is the moment when top management puts its ISMS to the test. Not the IT department, not the ISO — top management. This articl...

2026-02-28 13 min read
Audit
Audit

Evaluating Audit Findings and Deriving Actions

An audit finding is just the beginning. The real value emerges only when you correctly assess the finding, analyze the root cause, and define a cor...

2026-03-01 13 min read
Datenschutz
Datenschutz

Creating a Record of Processing Activities (ROPA) per Art. 30 DSGVO (GDPR)

A record of processing activities per Art. 30 DSGVO (GDPR) is mandatory for almost every organization. This article shows you which details are req...

2026-03-02 14 min read
Datenschutz
Datenschutz

Documenting Technical and Organizational Measures (TOMs)

TOMs per Art. 32 DSGVO (GDPR) are the backbone of any data protection documentation. This article explains the 8 classic TOM categories, provides c...

2026-03-03 15 min read
Datenschutz
Datenschutz

Data Processing Agreements: How to Review DPAs and Assess Service Providers

A DPA (Data Processing Agreement) is quickly signed but rarely thoroughly reviewed. This article shows you when data processing on behalf of a cont...

2026-03-04 14 min read
ISMS
ISMS

Creating an Access Control Concept: Roles, Permissions, and Approval Workflow

An access control concept defines who may access which systems and data. Without it, there is no control over which employees actually hold which p...

2026-03-05 14 min read
ISMS
ISMS

User Lifecycle: Managing Onboarding, Offboarding, and Role Changes

When a new employee starts, they need access to all relevant systems on day one. When someone leaves the company, all accounts must be deactivated ...

2026-03-06 13 min read
Asset-Management
Asset-Management

IT Asset Management for the ISMS: Inventory, Criticality, and Classification

An ISMS without an asset inventory is like an insurance policy without knowing the insured objects. This article shows you how to build a complete ...

2026-03-07 14 min read
Asset-Management
Asset-Management

Protection Needs Assessment: Evaluating Confidentiality, Integrity, and Availability

The protection needs assessment is the link between the asset inventory and the risk assessment. This article explains the BSI methodology, the thr...

2026-03-08 13 min read
Schulung
Schulung

Building a Security Awareness Program: What Employees Really Need to Know

Technical safeguards alone are not enough when employees click on phishing emails or write passwords on sticky notes. A well-designed security awar...

2026-03-09 14 min read
Schulung
Schulung

Training Records in the ISMS: What Must Be Documented

Conducting training is one thing. Documenting it so that the auditor is satisfied and the records are still traceable three years later is another....

2026-03-10 13 min read
Incident Response
Incident Response

Ransomware Attack: Immediate Response, Communication, and Recovery

When ransomware strikes, every minute counts. The decisions made in the first half hour determine whether damage stays contained or the entire orga...

2026-03-11 16 min read
Schulung
Schulung

Phishing Detection and Reporting: A Practical Guide for Employees and IT

Phishing is the number one attack vector, and attacks are becoming increasingly sophisticated. This practical guide shows how employees can reliabl...

2026-03-12 15 min read
ISMS
ISMS

Implementing Multi-Factor Authentication (MFA): Strategy, Rollout, and User Adoption

MFA is one of the most effective defenses against compromised credentials and is listed as one of the ten minimum measures under NIS2. Yet many org...

2026-03-13 15 min read
ISMS
ISMS

Network Segmentation for SMEs: Why and How to Partition Your Network

A flat network is like a building without fire doors: once an attacker is in, they can move freely. Network segmentation limits the blast radius, p...

2026-03-14 15 min read
ISMS
ISMS

Patch Management for Mid-Market Companies: Process, Prioritization, and Automation

Unpatched systems are the wide-open barn door of IT security. Yet many mid-market companies struggle with a structured patch process: too many syst...

2026-03-15 15 min read
ISMS
ISMS

Email Security: Setting Up SPF, DKIM, DMARC, and Encryption Correctly

Email is the most common attack vector for cyberattacks on businesses. Phishing, spoofing, and business email compromise can be significantly thwar...

2026-03-16 16 min read
ISMS
ISMS

Zero Trust for Mid-Market Companies: Implementing the Principles Without an Enterprise Budget

Zero Trust is not a product you buy but an architectural principle you implement step by step. Even without a six-figure budget, you can embed the ...

2026-03-17 15 min read
ISMS
ISMS

Secure Remote Work: VPN, Endpoint Security, and Policies for Home Offices

Home offices and remote work are part of everyday life, but many companies' security concepts are still designed for the office. This article cover...

2026-03-18 16 min read
ISMS
ISMS

Encryption in the Enterprise: What, Where, and How to Encrypt

Encryption is one of the ten NIS2 minimum measures and a central building block of every ISMS. But what exactly needs to be encrypted, which algori...

2026-03-19 16 min read
ISMS
ISMS

Securing Active Directory: The 10 Most Important Measures

Active Directory is the heart of virtually every Windows environment and therefore the primary target in cyberattacks. Whoever controls AD controls...

2026-03-20 16 min read
ISMS
ISMS

Logging and Monitoring: What You Should Log and Why

Without logs, you're blind. Without monitoring, you're deaf. And without both, you only find out something happened when it's too late. This articl...

2026-03-21 15 min read
NIS2
NIS2

NIS2 for IT Service Providers and MSPs: The Dual Role as Affected Party and Advisor

IT service providers and Managed Service Providers face a unique challenge under NIS2: They are directly affected and must simultaneously support t...

2026-03-22 14 min read
NIS2
NIS2

NIS2 for Mechanical Engineering and Manufacturing

The manufacturing sector is among those regulated by NIS2 through Annex II. For mechanical engineers, this means: OT security, IT/OT convergence, a...

2026-03-27 13 min read
NIS2
NIS2

NIS2 for Logistics and Transportation: Requirements and Implementation

Transport and logistics are among the sectors of high criticality under NIS2 (Annex I). Freight forwarders, logistics centers, and transportation c...

2026-03-28 13 min read
NIS2
NIS2

NIS2 for Healthcare: Hospitals, Laboratories, and Medical Technology

Healthcare is classified as a sector of high criticality under NIS2. Hospitals, laboratories, pharmaceutical companies, and medical device manufact...

2026-03-29 14 min read
NIS2
NIS2

NIS2 for Energy Suppliers and Municipal Utilities

Energy is classified as a sector of high criticality under NIS2 and is therefore subject to the strictest requirements. For municipal utilities and...

2026-03-30 14 min read
ISMS
ISMS

TISAX Certification: Requirements, Process, and Assessment for Automotive Suppliers

TISAX is the information security standard of the automotive industry and a prerequisite for working with OEMs like VW, BMW, or Mercedes. This arti...

2026-04-02 15 min read
ISMS
ISMS

IT Security for Skilled Trades and Small Businesses Under 50 Employees

Even without NIS2 obligations, skilled trades and small businesses face daily cyber threats. Ransomware hits a small electrical contractor just as ...

2026-03-28 14 min read
ISMS
ISMS

Choosing ISMS Software: What Matters in the Evaluation

Excel spreadsheets, SharePoint folders, or a specialized ISMS tool? Anyone running an information security management system will sooner or later f...

2026-03-25 14 min read
ISMS
ISMS

Self-Hosted vs. Cloud: Data Sovereignty in Compliance Software

Compliance software manages the most sensitive data in an organization: risk assessments, security vulnerabilities, audit results. Where this data ...

2026-03-26 14 min read
ISMS
ISMS

What Does an ISMS Cost? Realistically Estimating Budget, Effort, and ROI

Building an ISMS costs money, time, and attention. But how much exactly? This article breaks down the cost factors, provides realistic budget range...

2026-03-23 15 min read
ISMS
ISMS

CISO: External or Internal? Pros and Cons for Mid-Market Companies

The Information Security Officer is the central figure in the ISMS. But does it have to be a dedicated employee, or can an external service provide...

2026-04-01 14 min read
ISMS
ISMS

ISO 27001 Certification: Process, Costs, and Effort for SMEs

ISO 27001 certification is achievable for SMEs when the process is clear and costs are planned realistically. This article explains the entire cert...

2026-03-24 14 min read
ISMS
ISMS

Cybersecurity as a Competitive Advantage: Why Customers Are Asking

Cybersecurity has long ceased to be a purely IT topic. More and more customers and clients demand verifiable evidence before awarding contracts. Or...

2026-04-03 13 min read
NIS2
NIS2

NIS2 Implementation on a Limited Budget: Setting Pragmatic Priorities

No dedicated security team, no six-figure budget, and still need to become NIS2-compliant? It's possible. This article shows how to prioritize the ...

2026-04-03 14 min read
ISMS
ISMS

ISMS Documentation: Which Documents You Actually Need (and Which You Don't)

Documentation is the backbone of every ISMS. But between mandatory documents per ISO 27001, recommended evidence, and unnecessary paperwork, there'...

2026-04-05 14 min read
NIS2
NIS2

NIS2 Checklist: All Requirements at a Glance

NIS2 confronts organizations with a multitude of requirements: registration, ten minimum measures, reporting obligations, governance, supply chain ...

2026-04-01 15 min read
ISMS
ISMS

Writing a Security Concept: Structure and Template for SMEs

An IT security concept describes how an organization protects its information assets. This article explains the difference between concepts, polici...

2026-04-07 14 min read
BCM
BCM

IT Emergency Card: The Most Important Contacts and Steps on a Single Page

The IT emergency card is the simplest and most effective tool in emergency management: a laminated card at the workplace with the most important co...

2026-04-08 13 min read
ISMS
ISMS

Supply Chain Attacks: How to Protect Yourself from Compromised Suppliers

SolarWinds, Kaseya, Log4j — the most devastating cyberattacks of recent years didn't come through the front door but via trusted suppliers and soft...

2026-04-09 15 min read
Schulung
Schulung

Social Engineering in the Enterprise: Methods, Examples, and Countermeasures

Social engineering is the most effective attack vector against organizations because it manipulates people, not technology. From CEO fraud to prete...

2026-04-10 16 min read
ISMS
ISMS

Insider Threats: When the Danger Comes from Within

Not every threat comes from outside. Insider threats from employees, contractors, or compromised accounts are among the most difficult security ris...

2026-04-11 15 min read
ISMS
ISMS

AI and Cybersecurity: Opportunities and New Attack Vectors

Artificial intelligence is fundamentally changing the cybersecurity landscape — on both sides. Attackers use AI for convincingly realistic phishing...

2026-04-12 15 min read
ISMS
ISMS

Cloud Security for SMEs: The Most Common Misconfigurations and How to Avoid Them

Most cloud security incidents are not caused by sophisticated attacks but by misconfigurations. Open storage accounts, missing MFA, overly broad pe...

2026-04-13 16 min read
ISMS
ISMS

Explaining IT Security to Executive Management: How to Get Budget and Buy-In

Many ISOs and IT managers don't fail because of missing security concepts — they fail because they can't convince executive management. Those who c...

2026-04-07 14 min read
Incident Response
Incident Response

Communicating Security Incidents: Internally, Externally, and to the Press

When a security incident occurs, communication largely determines the extent of the damage. Communicating too late, too vaguely, or to the wrong au...

2026-04-15 15 min read
ISMS
ISMS

Working with External Consultants: How to Make Your ISMS Project a Success

External consultants can significantly accelerate building an ISMS. But they can also steer the project in the wrong direction if the collaboration...

2026-04-16 14 min read
Schulung
Schulung

Information Security in Onboarding: Engaging New Employees from Day 1

New employees are especially vulnerable to security mistakes in their first weeks. At the same time, this phase shapes the habits that persist for ...

2026-04-17 13 min read
Richtlinien
Richtlinien

Creating a Cryptography Policy: Algorithms, Key Lengths, and Lifecycle

Cryptography is one of the ten NIS2 minimum measures and also one of the topics where companies most frequently stumble. Not because the technology...

2026-04-18 14 min read
ISMS
ISMS

Building Vulnerability Management: Scanners, Prioritization, and Patch Workflow

Vulnerabilities in software and systems are part of everyday IT life. The problem is rarely that vulnerabilities exist, but that they are detected ...

2026-04-19 15 min read
BCM
BCM

Data Backup According to BSI: The 3-2-1-1-0 Principle in Practice

Almost everyone in IT knows the 3-2-1 backup rule. But the original rule is no longer sufficient to defend against current threats like ransomware....

2026-04-20 14 min read
ISMS
ISMS

Supplier Assessment with Security Questionnaires: Template and Approach

NIS2 explicitly requires supply chain security. For most mid-market companies, this means: you must systematically assess your IT service providers...

2026-04-21 16 min read
Datenschutz
Datenschutz

Data Deletion Policy Under DSGVO (GDPR): Retention Periods, Deletion Rules and Implementation

A data deletion policy is not optional — it is a direct obligation under the DSGVO (GDPR). This article explains which retention periods apply, how...

2026-04-22 15 min read
ISMS
ISMS

Change Management in the ISMS: Steering Changes Safely

Every change to IT systems carries risks for information security. This article shows how to build a pragmatic change management process for your I...

2026-04-23 14 min read
ISMS
ISMS

ISMS Glossary: All Key Terms from A to Z

From Annex A to Zero Trust: this glossary explains over 50 key terms related to information security, ISMS and ISO 27001. With cross-references to ...

2026-04-24 30 min read
ISMS
ISMS

The CIA Triad Explained: Confidentiality, Integrity and Availability in Practice

Confidentiality, integrity and availability form the foundation of every information security strategy. This article explains the three protection ...

2026-04-25 16 min read
ISMS
ISMS

The PDCA Cycle in the ISMS: Plan-Do-Check-Act in Practice

The PDCA cycle is the backbone of every living ISMS. This article explains the four phases with concrete ISMS relevance, follows a risk through the...

2026-04-26 17 min read
ISMS
ISMS

Securing Microsoft 365: The 15 Most Important Security Settings

Microsoft 365 is run out-of-the-box in most companies, yet the default settings are far from secure. This article describes the 15 most important s...

2026-04-04 22 min read
ISMS
ISMS

Conditional Access in Entra ID: Policies for SMEs

Conditional Access is the heart of access control in Microsoft 365 and Entra ID. Yet many companies shy away from setup because they fear lockouts....

2026-04-28 20 min read
ISMS
ISMS

Microsoft Defender for Business: Is Switching from a Traditional Antivirus Worth It?

Traditional antivirus scanners detect known malware, but they are blind to fileless attacks, living-off-the-land techniques and zero-day exploits. ...

2026-04-29 19 min read
ISMS
ISMS

Securing SharePoint and OneDrive: Sharing, DLP, and Data Classification

SharePoint and OneDrive are the central data stores in Microsoft 365, yet the default settings allow extensive external sharing without any control...

2026-04-30 20 min read
ISMS
ISMS

Teams Security: Guest Access, External Sharing, and Compliance

Microsoft Teams has become the central communication platform—and with it, the place where sensitive business information is exchanged. Yet the def...

2026-05-01 19 min read
ISMS
ISMS

Azure Security Basics: NSGs, Key Vault, and Security Center for SMEs

More and more mid-market companies are running workloads in Azure, but security configuration often falls by the wayside. This article explains the...

2026-05-02 21 min read
ISMS
ISMS

Securing Exchange Online: Anti-Phishing, Safe Links, and Mail Flow Rules

Email remains the number one attack vector: over 90 percent of all successful cyberattacks begin with a phishing email. Exchange Online offers exte...

2026-05-03 21 min read
ISMS
ISMS

Microsoft Secure Score: What It Measures and How to Improve It

The Microsoft Secure Score summarizes the security posture of your M365 tenant in a single number and delivers prioritized improvement recommendati...

2026-05-04 18 min read
ISMS
ISMS

Intune for Beginners: Device Management Without Enterprise Complexity

Microsoft Intune manages endpoints and protects corporate data, yet many mid-market companies shy away from its perceived complexity. This article ...

2026-05-05 22 min read
Incident Response
Incident Response

Ransomware Scenario: Friday Evening, 6 PM – A Step-by-Step Walkthrough

It's Friday evening, most employees are gone, and suddenly the systems are down. Ransomware has struck. This article walks you through the incident...

2026-04-06 18 min read
Incident Response
Incident Response

CEO Fraud Scenario: When the Boss Orders a Wire Transfer by Email

An urgent email from the CEO, a confidential wire transfer, time pressure. CEO Fraud is one of the most dangerous social engineering methods becaus...

2026-05-07 17 min read
Incident Response
Incident Response

Data Breach Scenario: Customer Data on the Darknet – What to Do Now

An external tip, a darknet discovery, customer data in circulation. When a data breach comes to light, a race against time begins: DSGVO (GDPR) rep...

2026-05-08 18 min read
Incident Response
Incident Response

Compromised Admin Account Scenario: Detecting and Stopping Lateral Movement

An attacker has taken over an admin account and is moving undetected through your network. Lateral movement is the most dangerous phase of an attac...

2026-05-09 18 min read
Incident Response
Incident Response

Supplier Hack Scenario: Your IT Service Provider Has Been Compromised

Your Managed Service Provider reports a compromise. Suddenly you have not been hacked yourself, but the service provider who has admin access to yo...

2026-05-10 18 min read