The Managed Workplace revolutionizes the way we work by combining the management of all IT devices, software distribution, configuration and security checks. We rely on proven open source tools that intelligently combine to create a modern, digitally sovereign working environment.
Pay in seconds without having to search for the right amount, identification and admission in passing: RFID and NFC technology have made our everyday lives easier and more convenient. The WLAN-like symbol with the four radio waves on the cards and transponders shows that an RDIF signal is being transmitted. We explain how these technologies work, where they are used and how you can effectively protect your data.
Passwords play a crucial role in the security of our personal data online. As we need access data for many different online services and accounts these days, it can be difficult to keep track of all our passwords. To avoid falling into the trap of using the same password everywhere, it is advisable to use a password manager. This way, complex passwords can be managed securely.
IT service provider Open Circle brings Thanuja Parameswaran and Caroline Oestvold on board. This increases the customer support team from three to five people. Destina Meier, Elsbeth Schmid and Dominique Heinzler were previously responsible for the well-being of customers.
Due to the current situation, there is a threat of a power shortage in the coming winter. We asked Christoph Stucky, Chief Information Security Officer at Open Circle, how he assesses the situation, how Open Circle is prepared for the situation and what companies can do now to prevent it.
Together with external security experts, we at Open Circle carry out a comprehensive security test of our Swiss Business Cloud (SBC) every year. In so-called penetration tests, the experts specifically attack various areas of our cloud and thus check them for any security gaps.
That microchips are ubiquitous has been brought home to us in recent months with their scarcity. Many industries have had to interrupt or reduce production because they were unable to procure the required number of microchips. But how is such a chip designed in the first place? How do you get the complexity of several billion switching elements under control and how do these circuits finally get onto / into the silicon?
Do you own an Android phone and have received an SMS message with a link to a voice message? Then you should delete this message unread, because behind it there is most likely a new malware called “Flubot”, which has recently become active in Switzerland.
Young Solutions AG and ITIGO AG merge. Together we will become Open Circle AG. After an intensive preparation period and the formal resolution of both general meetings, the merger was published in the SOGC on Friday, December 11, 2020, and thus officially sealed.
The Swiss-US Privacy Shield Regime, which was denied recognition by the Federal Data Protection and Information Commissioner (FDPIC) on September 8, 2020, serves as the basis for adequate data protection for data disclosures from Switzerland and the USA. The Privacy Shield Regime does not provide an adequate level of protection according to the Federal Data Protection Act (FADP). In doing so, the FDPIC is following the decision of the European Court of Justice, which declared the Privacy Shield agreement between the USA and the EU to be invalid.
Did you know that commuting is considered the biggest obstacle to happiness? Since the turn of the millennium, the number of people who regularly work from home has more than tripled, according to a study by the Federal Statistical Office (2019). This is due to the sharp increase in digitalization and the implementation of new forms of work. This allows you to offer home office in the long term without having to sacrifice productivity.
In their latest Twitter message, the federal government’s Computer Emergency Response Team (CERT) warns of emails infected with malware that are currently circulating. The cybercriminals are taking advantage of the current media coverage about rising health insurance premiums to send fake emails in the name of health insurance companies. The aim of this action is to infect computers with the “Retefe” e-banking Trojan.
In its notification of July 5, 2018, the Confederation warns companies against fraud calls. In the process, the callers are said to pose as bank employees and pretend to have to carry out an update in e-banking, which is then to be tested.
According to Cisco’s annual cyber security report, cyber criminals attempt to obtain trustworthy data from unsuspecting Internet users every second with the help of approximately 3,000 manipulated sender addresses. Learn more about phishing in our blog-post.
In just a few months, on May 25, 2018, the new EU General Data Protection Regulation (GDPR) will come into force. As a consequence, the appointment of an EU data protection officer will become mandatory for many Swiss companies that do not have a domicile in the EU.
Cybercrime is becoming more professional and targeted attacks are no longer a rarity. Every day, security vulnerabilities are exploited by successful attacks worldwide. Further threats such as data loss, disclosure or misuse of confidential information increase the risk to information security. That is why we have decided to ensure the highest possible level of protection. It is with pleasure and pride that we announce that after several months of preparation and a two-day audit, Young Solutions AG has been officially ISO 27001 certified since 26.04.2017. The successful certification is at the same time also a sign of quality for customers, partners and suppliers.
Most modern monitors offer multiple ports, just like PCs and laptops offer multiple ways to connect monitors. Most users understand relatively little under the abbreviations HDMI, DP, DVI, VGA and USB-C. Most are content to find a suitable cable to connect the screen. It is worth considering which connections offer what.
The Reporting and Analysis Center for Information Assurance (MELANI) published a warning about malicious Office documents in mail attachments last Friday. The number of spam campaigns with malicious Microsoft Office documents has increased rapidly in recent weeks. Spam campaigns aimed at infecting computers with malicious software (malware) are now being observed on an almost daily basis.
Under the name “All IP”, Swisscom wants to switch off the analog telephone network by the end of 2017 and is planning the complete changeover to telephony via the Internet, also known as Voice over IP (VoIP). By then, the switchover of the approximately two million customers who still use analog telephony should be completed. This affects around 70 percent of SMEs and 30 percent of large companies that still use analog telephony or ISDN.