How do you maintain resilient IT infrastructures in the medical sector?

DORA und medizinisches Factoring (Bild: Freepik)

Hospitals, surgeries, laboratories and other healthcare facilities are frequently targeted by cyber attacks. Many of these attacks are successful because IT systems are inadequately protected. The situation therefore requires basic security measures, as increasingly demanded by current regulations and standards.

Continue reading “How do you maintain resilient IT infrastructures in the medical sector?”

Watch out! These 13 myths about System Hardening persist – even though they’re not true

Systemhärtung Mythen (Bild: Adobe Firefly)

Many people believe they know exactly what System Hardening means and what (not) to do here. However, these ideas are often based on half-truths or misunderstandings. This article dispels the biggest myths surrounding the topic and shows why System Hardening is more than is sometimes believed.

Continue reading “Watch out! These 13 myths about System Hardening persist – even though they’re not true”

No more ‘PrintNightmare’: Close Linux CUPS security gaps correctly – so that the printer does not become a gateway

Linux CUPS Printer Security Gap (Bild: Freepik Pikaso)

Nobody is perfect – not even Linux. You may still have an undiscovered security vulnerability on your system that allows attackers to penetrate the network via your printers. Here’s how you can avoid a CUPS disaster.

Continue reading “No more ‘PrintNightmare’: Close Linux CUPS security gaps correctly – so that the printer does not become a gateway”