aschuster4you

About Andreas Schuster

Als Experte für Informationssicherheit / Informationssicherheits-Managementsysteme (ISMS), IT-Sicherheit, Authentifizierung, sowie PKI und Verschlüsselung verfügt er über mehr als 20 Jahre technische Erfahrung in Serverinfrastruktur sowie Unternehmensnetzwerkarchitektur. Seine ausgezeichneten Kenntnisse in ISO 27001 und ISA 6 / TISAX ermöglichen es ihm, Kunden in NIS2 Umsetzungen und bei InfoSec Zertifizierungsprozessen effektiv zu unterstützen. Zudem ist er hervorragend mit europäischen Zertifizierungsstellen vernetzt.

GDPR: AIR’s Basic Data Pro­tec­tion Regu­la­ti­on Semi­nar — 22. Jän. 2018

On January 22, 2018, Akademie Interne Revision GmbH (AIR) will be holding a seminar in Vienna on the topic of "Basic Data Protection Regulation (DSGVO)". Seminar topic: After many years of intensive negotiations, the EU member states have agreed on a reform of data protection in Europe. The GDPR came into force on 24.5.2016 and [...]

By |2022-11-06T09:58:29+01:0011.11.2017|Data protection, Events|

free GDPR work­shop “What & How” on 12.12.2017 — Data sub­ject rights

2nd date: Data subjects' rights according to Article 12-23 - "Data subjects' rights" In preparation for the General Data Protection Regulation, SEC4YOU offers a series of events focusing on the "what" and the "how". In workshops, defined results of the concrete implementation (the "how") are presented in addition to the known requirements of the [...]

By |2022-11-06T09:58:41+01:0008.11.2017|Data protection, Events|

free GDPR work­shop “What & How” on 7.11.2017

1st deadline: The directory of processing activities according to Article 30 In preparation for the General Data Protection Regulation, SEC4YOU offers a series of events focusing on the what and how. In workshops, defined results of the concrete implementation (the "how") will be presented in addition to the known requirements of the EU GDPR (the [...]

By |2022-11-06T09:59:04+01:0017.10.2017|Data protection, Events|

CMG-AE Con­fe­rence: Indus­try 4.0 — New Con­cepts and Solu­ti­ons for Safe­ty and Security

On October 19, 2017 SEC4YOU, Mr. Manfred Scholz supports the CMG-AE conference "Industry 4.0: New Concepts and Solutions for Safety and Security" with the presentation "Safety norms and standards - for practice". The presentation deals with the standard IEC 62443 Industrial communication networks - IT security for networks and systems, which will be used in [...]

By |2022-11-06T09:59:27+01:0013.10.2017|Events|

HR as a gate­way for attacks: The HR depart­ment has no firewall

Cyberattacks proceed just as they did in the analog world over 100 years ago. They are based on communication and knowledge of confidential information. While applications, networks and other technical details are always the subject of intense discussion in the Internet age, people forget about the parts of information security that have little or no [...]

By |2024-04-19T18:38:44+02:0002.09.2017|Blog EN|

Tip #4: Cau­ti­on Social Engineering

Social engineering exploits human behavior such as helpfulness or respect for authority to obtain confidential information. When communicating with unknown people, be careful what information you disclose. Places and media used for social engineering: public transportation at the lunch table at business events in the company parking lot by telephone by e-mail online surveys through [...]

By |2022-11-06T10:02:29+01:0002.04.2017|Hints|

Tip #3: Always super­vi­se visitors

The entry of visitors or guests without supervision poses a risk to the protection of information. Always pick up visitors from the doorman and escort them while they are in the company. If there are guest badges, ask your visitors to wear them, especially if they are allowed to move freely around the company. Do [...]

By |2022-11-06T10:02:36+01:0002.04.2017|Hints|

Tip #2: A sti­cky note is no place for passwords

Sticky notes or Post-it's® are not a suitable place for the permanent storage of passwords. Any password written down allows identity theft and subsequently unauthorized access to information. Therefore, keep your passwords in a safe place. Even if it is difficult in everyday life, access codes should not be written down here: Post-it's® notebooks the [...]

By |2022-11-06T10:02:46+01:0002.04.2017|Hints|

Tip #1: Think befo­re you click!

Fake emails are used to spread malware and trick recipients into revealing sensitive information. Do not fall into the trap and be skeptical of unknown senders. Hence the advice to "Think before you click!". Typical deceptions that can cause harm by a click / click: Letter from the bank to update the account data, for [...]

By |2022-11-06T10:02:54+01:0002.04.2017|Hints|
Go to Top