SpotON – our blog around digital compliance in enterprises
SpotON – Digital Compliance
Read here regularly on selected topics, developments and news from the areas:
SAM & Cloud – use software legally compliant and cost-effective
IT Security & Threat Intelligence – protect the IT landscape effectively
Data & Digitization – manage digital assets across the lifecycle
Complion Insights – look behind the scenes of digital compliance consultants
18/10/2023
BSI IT-Grundschutz Standard 200-4 vs. 100-4 - This changes with the update
Whether it's technical issues, user errors, or ransomware, almost every modern business has to deal with incidents. To minimize the impact of these disruptions on day-to-day operations and protect critical business processes, business continuity management (BCM) systems use compressed planned and organized procedures that minimize resilience within their own organization as well as damage and downtime.
In the following article, we highlight the procedure according to the current BSI IT-Grundschutz Standard 200-4, compare it with the previous standard (Standard 100-4) and show how you can use it to sensibly secure your own company in the event of a disaster.
Atlassian – End of support for "Server" licenses: What are the alternatives?
As of February 15, 2024, Atlassian will end support for "Server" licenses. A switch to data center licensing or to the cloud is associated with a huge increase in costs. What alternatives exist for Atlassian customers and what options an Enterprise License Agreement (ELA) offers is examined in more detail in this blog post.
High-End Spyware and governments – Match Made in Heaven?
Complion supports Voice – Bundesverband der IT-Anwender e.V. with the weekly preparation of IT security situation reports as part of the Cyber Security Competence Center (CSCC). In September, these situation reports contained an increasing number of reports on actively exploited vulnerabilities in Apple operating systems and common web browsers. The exploitation was carried out by relevantly known, highly complex malware used by government agencies – high-end state Trojans. The names: Pegasus and Predator. In this blog post we will chronologically summarize the last calendar weeks. The series started with a news item on 7 September.
The Cyber Security Competence Center (CSCC): A review of the imH conference "Forum IT: Cybersecurity & Hacker Attacks"
On September 6 and 7, experts, decision makers and enthusiasts from the world of cybersecurity came together in the Austrian capital Vienna to exchange views on the latest findings and developments as well as the current threat situation. In cooperation with VOICE - Bundesverband der IT-Anwender e.V. we presented the Cyber Security Competence Center (CSCC) in Austria. In this blog post, we take a closer look at the current service portfolio and highlight the initiatives to strengthen cybersecurity in Germany, Austria and Switzerland.