SpotON – our blog around digital compliance in enterprises
SpotON – Digital Compliance
Read here regularly on selected topics, developments and news from the areas:
SAM & Cloud – use software legally compliant and cost-effective
IT Security & Threat Intelligence – protect the IT landscape effectively
Data & Digitization – manage digital assets across the lifecycle
Complion Insights – look behind the scenes of digital compliance consultants
18/10/2023
BSI IT-Grundschutz Standard 200-4 vs. 100-4 - This changes with the update
Whether it's technical issues, user errors, or ransomware, almost every modern business has to deal with incidents. To minimize the impact of these disruptions on day-to-day operations and protect critical business processes, business continuity management (BCM) systems use compressed planned and organized procedures that minimize resilience within their own organization as well as damage and downtime.
In the following article, we highlight the procedure according to the current BSI IT-Grundschutz Standard 200-4, compare it with the previous standard (Standard 100-4) and show how you can use it to sensibly secure your own company in the event of a disaster.
Atlassian – End of support for "Server" licenses: What are the alternatives?
As of February 15, 2024, Atlassian will end support for "Server" licenses. A switch to data center licensing or to the cloud is associated with a huge increase in costs. What alternatives exist for Atlassian customers and what options an Enterprise License Agreement (ELA) offers is examined in more detail in this blog post.
High-End Spyware and governments – Match Made in Heaven?
Complion supports Voice – Bundesverband der IT-Anwender e.V. with the weekly preparation of IT security situation reports as part of the Cyber Security Competence Center (CSCC). In September, these situation reports contained an increasing number of reports on actively exploited vulnerabilities in Apple operating systems and common web browsers. The exploitation was carried out by relevantly known, highly complex malware used by government agencies – high-end state Trojans. The names: Pegasus and Predator. In this blog post we will chronologically summarize the last calendar weeks. The series started with a news item on 7 September.
The Cyber Security Competence Center (CSCC): A review of the imH conference "Forum IT: Cybersecurity & Hacker Attacks"
On September 6 and 7, experts, decision makers and enthusiasts from the world of cybersecurity came together in the Austrian capital Vienna to exchange views on the latest findings and developments as well as the current threat situation. In cooperation with VOICE - Bundesverband der IT-Anwender e.V. we presented the Cyber Security Competence Center (CSCC) in Austria. In this blog post, we take a closer look at the current service portfolio and highlight the initiatives to strengthen cybersecurity in Germany, Austria and Switzerland.
In this blog post, I would like to provide a basic overview of the most widely used frameworks for effective and efficient enterprise IT architecture. IT architecture frameworks provide a structured and standardized approach, deliver best practices for implementing and improving IT governance, and ensure that IT resources, services and processes are implemented effectively and efficiently.
In a sea of data - How companies can create value from their data
It remains critical for companies to get the most value from their rapidly growing data. In order not to get lost in the flood of data, the realization of high data quality through effective data management and governance is crucial.
WorkatiONs (a combination of Work and Vacation) are already a tradition at Complion. This year we went to The Hague, capital of the province of South Holland, seat of parliament and government of the Netherlands and capital of human rights. In this blog post, we would like to tell you more about how such a workatiON works for us and what we experienced together there.
The importance of feedback in consulting: how to give and receive feedback to improve performance
Feedback is an important part of the work in consulting. It helps to promote one's own performance and development, improve teamwork, ensure the quality of projects and satisfy customers. But how do you give and receive feedback in consulting in a professional and constructive way?
Our company is made up of people and we want to introduce them to you in the coming weeks and months. Today we talk to Lukas Marx, our intern. We find out how he became aware of COMPLION, what his daily tasks were, and what he has to tell about his internship with us.
New level of escalation between the U.S. and China - Chinese hacking attacks against U.S. government agencies and military become public
Two IT security incidents have been communicated by the US government in recent weeks. Both incidents involved targeted cyberattacks by suspected Chinese malicious actors. Targets of the attacks included critical infrastructure of the U.S. Armed Forces as well as senior staff of the U.S. Department of Commerce. We provide a brief analysis of the attacks here in this blog post.
Cloud Marketplaces – The Shopping Platform for Cloud Services in the Enterprise Context
Today, it is almost impossible for a company to avoid cloud marketplaces. These are online marketplaces that offer cloud services in a straightforward manner with a catalog of often more than a thousand offers, enable procurement as in online shopping per click, and present companies with organizational and process challenges. What are the three levels to consider when using cloud marketplaces?
For many newcomers to the profession or people unfamiliar with the field, the work of a management consultant is unknown and often characterized by prejudices and myths. To give outsiders an idea of the daily routine and the work that has to be done as a consultant, I have described a classic working day of mine.