An important issue that is often forgotten is locking the screen during short breaks. It is crucial for the security of our data and systems and a simple measure to prevent unwanted access to our personal information. Especially in work environments where many people have access to a computer, it is particularly important to lock the computer when leaving the workplace. Find out in this article why this topic is relevant to security and how you as a user can lock and unlock your various screens.
Pay in seconds without having to search for the right amount, identification and admission in passing: RFID and NFC technology have made our everyday lives easier and more convenient. The WLAN-like symbol with the four radio waves on the cards and transponders shows that an RDIF signal is being transmitted. We explain how these technologies work, where they are used and how you can effectively protect your data.
Passwords play a crucial role in the security of our personal data online. As we need access data for many different online services and accounts these days, it can be difficult to keep track of all our passwords. To avoid falling into the trap of using the same password everywhere, it is advisable to use a password manager. This way, complex passwords can be managed securely.
In the digital era, data is the backbone of any business. Data loss can be catastrophic – from business interruption to significant financial loss. Whether it’s human or technical error, […]
IT service provider Open Circle was audited in March according to ISO 27001, 27017 and 27018 and successfully re-certified. In addition, the company received the ISO 9001 certificate again for three years.
Due to the current situation, there is a threat of a power shortage in the coming winter. We asked Christoph Stucky, Chief Information Security Officer at Open Circle, how he assesses the situation, how Open Circle is prepared for the situation and what companies can do now to prevent it.
Together with external security experts, we at Open Circle carry out a comprehensive security test of our Swiss Business Cloud (SBC) every year. In so-called penetration tests, the experts specifically attack various areas of our cloud and thus check them for any security gaps.
Do you own an Android phone and have received an SMS message with a link to a voice message? Then you should delete this message unread, because behind it there is most likely a new malware called “Flubot”, which has recently become active in Switzerland.
The Swiss-US Privacy Shield Regime, which was denied recognition by the Federal Data Protection and Information Commissioner (FDPIC) on September 8, 2020, serves as the basis for adequate data protection for data disclosures from Switzerland and the USA. The Privacy Shield Regime does not provide an adequate level of protection according to the Federal Data Protection Act (FADP). In doing so, the FDPIC is following the decision of the European Court of Justice, which declared the Privacy Shield agreement between the USA and the EU to be invalid.
According to Cisco’s annual cyber security report, cyber criminals attempt to obtain trustworthy data from unsuspecting Internet users every second with the help of approximately 3,000 manipulated sender addresses. Learn more about phishing in our blog-post.
In just a few months, on May 25, 2018, the new EU General Data Protection Regulation (GDPR) will come into force. As a consequence, the appointment of an EU data protection officer will become mandatory for many Swiss companies that do not have a domicile in the EU.
It is with pleasure and pride that we announce that after several months of preparation and a two-day audit, Young Solutions AG has been officially ISO 27001 certified since 26.04.2017. The successful certification is at the same time also a sign of quality for customers, partners and suppliers.
We often hear and read that regular password changes increase security. Many companies also force their employees to do this. But does this really lead to more security?
Hand on heart: Do you use one and the same password for several online services? Or far too simple passwords, because it is almost impossible to remember a good password? Then you may be living dangerously.