El blog de la EnBITCon
QRishing (Quishing): When QR Codes Become a Phishing Trap
QR codes are everywhere: on parcels, parking meters, posters, invoices, access cards. That’s exactly what makes them...
Data Mesh vs. Data Lake – Which approach is right for you?
Companies collect more data than ever—but the real value only emerges when teams can work with it quickly, reliably...
Fail Friday: Screen Sharing & Personal Hotspot — Common Mistakes and Quick Fixes
Welcome to our Fail-Friday! Every second Friday of the month, we share anonymized little mishaps from everyday IT lif...
1971: The first email – older than the web
Sounds crazy, but it’s true: email is older than the World Wide Web. In 1971, U.S. programmer Ray Tomlinson sent the...
TEHTRIS MDR Protection
You can now get TEHTRIS security solutions directly from us – from Endpoint Detection & Response (EDR) to Managed Det...
New in the Shop: SonicWall
Effective immediately, you can get SonicWall solutions directly from our shop — from compact next-generation firewall...
How hackers think: Psychology, manipulation, & how to protect yourself
It is no longer enough to rely on technology alone. Attackers deliberately target the human as the entry point: they...
Attacks on energy and utility networks have tripled — what to do now
Electricity, water, heating, and mobility rely on connected systems more than ever. At the same time, the…
Sophos UTM (SG) EOL on June 30, 2026: Final 6-month renewal available until December 31, 2025 — we’ll support your migratio
Still using Sophos UTM (SG)? Then lock in your dates now: On December 31, 2025 there is a final opportunity to renew...