Blog EN https://www.infoguard.ch/en/blog InfoGuard's Cyber Security and Cyber Defence Blog informs about news and trends in the world of Cyber Security. de-ch Wed, 07 Dec 2022 07:05:09 GMT 2022-12-07T07:05:09Z de-ch Focus on data protection: The new Swiss data protection law and its consequences https://www.infoguard.ch/en/blog/focus-on-data-protection-the-new-swiss-data-protection-law-and-its-consequences <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/focus-on-data-protection-the-new-swiss-data-protection-law-and-its-consequences" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-cyber-security-ch-datenschutzgesetz-2.jpg" alt="infoguard-cyber-security-data-protection-law" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">In recent months, there has been a great deal written about the new Swiss Data Protection Act (DSG) – its innovations and content, differences from the European General Data Protection Regulation (GDPR), consequences and impacts for companies and how companies can best prepare for the revised law to be implemented. In this article, we will be focusing on the regulation’s effects on the new Data Protection Act.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/focus-on-data-protection-the-new-swiss-data-protection-law-and-its-consequences" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-cyber-security-ch-datenschutzgesetz-2.jpg" alt="infoguard-cyber-security-data-protection-law" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">In recent months, there has been a great deal written about the new Swiss Data Protection Act (DSG) – its innovations and content, differences from the European General Data Protection Regulation (GDPR), consequences and impacts for companies and how companies can best prepare for the revised law to be implemented. In this article, we will be focusing on the regulation’s effects on the new Data Protection Act.</p> <img src="https://track.hubspot.com/__ptq.gif?a=1865239&amp;k=14&amp;r=https%3A%2F%2Fwww.infoguard.ch%2Fen%2Fblog%2Ffocus-on-data-protection-the-new-swiss-data-protection-law-and-its-consequences&amp;bu=https%253A%252F%252Fwww.infoguard.ch%252Fen%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Data Governance Wed, 07 Dec 2022 07:05:09 GMT daniel.daeppen@infoguard.ch (Daniel Däppen) https://www.infoguard.ch/en/blog/focus-on-data-protection-the-new-swiss-data-protection-law-and-its-consequences 2022-12-07T07:05:09Z Advent, Advent, the school is “burning”! [Part 1] https://www.infoguard.ch/en/blog/advent-advent-the-school-is-burning-part-1 <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/advent-advent-the-school-is-burning-part-1" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/Cyber%20Adventsstory%20Blog%2022.jpg" alt="infoguard-advent-the-school-is-burning-cyber-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Dear readers, just like every year during Advent, we – by which I mean InfoGuard as a reliable cyber security partner, myself as a family man and my team (CSIRT) as our “fire brigade” – look back on what we have been motivated by this past year. What have we achieved? What could we have done better? What have we been affected by on a personal level? That is why this year, I want to tell you a cyber Advent story that happened very recently, and to fittingly quote a directing duo (I’m a big fan of the Cohen brothers): “This is a true story. The events depicted took place [in Baar in 2022]. At the request of the survivors, the names have been changed. Out of respect for the victims, the rest has been told exactly as it occurred”. Have fun reading it!</p> <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/advent-advent-the-school-is-burning-part-1" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/Cyber%20Adventsstory%20Blog%2022.jpg" alt="infoguard-advent-the-school-is-burning-cyber-security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Dear readers, just like every year during Advent, we – by which I mean InfoGuard as a reliable cyber security partner, myself as a family man and my team (CSIRT) as our “fire brigade” – look back on what we have been motivated by this past year. What have we achieved? What could we have done better? What have we been affected by on a personal level? That is why this year, I want to tell you a cyber Advent story that happened very recently, and to fittingly quote a directing duo (I’m a big fan of the Cohen brothers): “This is a true story. The events depicted took place [in Baar in 2022]. At the request of the survivors, the names have been changed. Out of respect for the victims, the rest has been told exactly as it occurred”. Have fun reading it!</p> <img src="https://track.hubspot.com/__ptq.gif?a=1865239&amp;k=14&amp;r=https%3A%2F%2Fwww.infoguard.ch%2Fen%2Fblog%2Fadvent-advent-the-school-is-burning-part-1&amp;bu=https%253A%252F%252Fwww.infoguard.ch%252Fen%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cyber Security Cyber Risks Mon, 05 Dec 2022 06:15:00 GMT stefan.rothenbuehler@infoguard.ch (Stefan Rothenbühler) https://www.infoguard.ch/en/blog/advent-advent-the-school-is-burning-part-1 2022-12-05T06:15:00Z DNS on the front line in the defence against cyber-attacks https://www.infoguard.ch/en/blog/dns-on-the-front-line-in-the-defence-against-cyber-attacks <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/dns-on-the-front-line-in-the-defence-against-cyber-attacks" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/infoguard-blog-dns-cyberangriffe.png" alt="infoguard-blog-dns-cyber-attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">The Domain Name System (DNS) is a central point in every network, and is essential for internet communication. For a long time now, cyber criminals have identified DNS as a weak point for attacks. However, it is better to use the system as an active defence than simply making the DNS secure against attacks! The aim of proactive DNS-level security – for example, using DNS data to contain threats that are missed by network-based controls – is to block threats before they can reach the corporate network or endpoints. In this blog post, we will show you exactly how to do this and what you should look for to help you choose the right solution.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/dns-on-the-front-line-in-the-defence-against-cyber-attacks" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/infoguard-blog-dns-cyberangriffe.png" alt="infoguard-blog-dns-cyber-attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">The Domain Name System (DNS) is a central point in every network, and is essential for internet communication. For a long time now, cyber criminals have identified DNS as a weak point for attacks. However, it is better to use the system as an active defence than simply making the DNS secure against attacks! The aim of proactive DNS-level security – for example, using DNS data to contain threats that are missed by network-based controls – is to block threats before they can reach the corporate network or endpoints. In this blog post, we will show you exactly how to do this and what you should look for to help you choose the right solution.</p> <img src="https://track.hubspot.com/__ptq.gif?a=1865239&amp;k=14&amp;r=https%3A%2F%2Fwww.infoguard.ch%2Fen%2Fblog%2Fdns-on-the-front-line-in-the-defence-against-cyber-attacks&amp;bu=https%253A%252F%252Fwww.infoguard.ch%252Fen%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cyber Security Network Security Thu, 24 Nov 2022 12:29:53 GMT reinhold.zurfluh@infoguard.ch (Reinhold Zurfluh) https://www.infoguard.ch/en/blog/dns-on-the-front-line-in-the-defence-against-cyber-attacks 2022-11-24T12:29:53Z Understanding, recognising and minimising supply chain cyber risk https://www.infoguard.ch/en/blog/understanding-recognising-and-minimising-supply-chain-cyber-risk <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/understanding-recognising-and-minimising-supply-chain-cyber-risk" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-cyber-security-cyber-risiken-lieferkette-supply-chain.jpg" alt="infoguard-understand-recognise-and-minimise-cyber-risks-in-supply-chains" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Supply chain attacks are genuinely a growing threat, making them a legitimate concern for many businesses. A chain reaction, potentially triggered by a successful attack on a single supplier, can jeopardise an entire network of suppliers, and with it the value chain – and your company too. In this article, we are taking a closer look at supply chain attacks, highlighting cyber risk factors and providing tips on how to minimise them.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/understanding-recognising-and-minimising-supply-chain-cyber-risk" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-cyber-security-cyber-risiken-lieferkette-supply-chain.jpg" alt="infoguard-understand-recognise-and-minimise-cyber-risks-in-supply-chains" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Supply chain attacks are genuinely a growing threat, making them a legitimate concern for many businesses. A chain reaction, potentially triggered by a successful attack on a single supplier, can jeopardise an entire network of suppliers, and with it the value chain – and your company too. In this article, we are taking a closer look at supply chain attacks, highlighting cyber risk factors and providing tips on how to minimise them.</p> <img src="https://track.hubspot.com/__ptq.gif?a=1865239&amp;k=14&amp;r=https%3A%2F%2Fwww.infoguard.ch%2Fen%2Fblog%2Funderstanding-recognising-and-minimising-supply-chain-cyber-risk&amp;bu=https%253A%252F%252Fwww.infoguard.ch%252Fen%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cyber Risks Mon, 07 Nov 2022 11:29:38 GMT markus.limacher@infoguard.ch (Markus Limacher) https://www.infoguard.ch/en/blog/understanding-recognising-and-minimising-supply-chain-cyber-risk 2022-11-07T11:29:38Z IaaS and SaaS: connection without any obstructions https://www.infoguard.ch/en/blog/iaas-and-saas-connection-without-any-obstructions <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/iaas-and-saas-connection-without-any-obstructions" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-cyber-security-cloud-anbindung-iaas-saas.jpg" alt="infoguard-cyber-security-cloud-connection-iaas-saas" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="text-align: left;"><strong>Is it true that “Infrastructure as a Service” (IaaS) or “Software as a Service” (SaaS) cannot work together with on-premises IT? Not at all! In this blog post, you will discover how an IaaS or an SaaS cloud environment can be combined with a company’'s on-premises IT in a classic hybrid situation. The focus here is on network-related aspects while keeping other aspects in mind. To give you a better illustration of this issue, let’s take a look at the scenario via a fictitious company. So once again, Hedgehog Winter Sleep AG has a challenge to overcome and we are invited to watch it unfold.</strong></p> <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/iaas-and-saas-connection-without-any-obstructions" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-cyber-security-cloud-anbindung-iaas-saas.jpg" alt="infoguard-cyber-security-cloud-connection-iaas-saas" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="text-align: left;"><strong>Is it true that “Infrastructure as a Service” (IaaS) or “Software as a Service” (SaaS) cannot work together with on-premises IT? Not at all! In this blog post, you will discover how an IaaS or an SaaS cloud environment can be combined with a company’'s on-premises IT in a classic hybrid situation. The focus here is on network-related aspects while keeping other aspects in mind. To give you a better illustration of this issue, let’s take a look at the scenario via a fictitious company. So once again, Hedgehog Winter Sleep AG has a challenge to overcome and we are invited to watch it unfold.</strong></p> <img src="https://track.hubspot.com/__ptq.gif?a=1865239&amp;k=14&amp;r=https%3A%2F%2Fwww.infoguard.ch%2Fen%2Fblog%2Fiaas-and-saas-connection-without-any-obstructions&amp;bu=https%253A%252F%252Fwww.infoguard.ch%252Fen%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> IT Security Fri, 28 Oct 2022 12:53:39 GMT markus.pfister@infoguard.ch (Markus Pfister) https://www.infoguard.ch/en/blog/iaas-and-saas-connection-without-any-obstructions 2022-10-28T12:53:39Z A cyber-attack on your identity provider – what you need to do now https://www.infoguard.ch/en/blog/a-cyber-attack-on-your-identity-provider-what-you-need-to-do-now <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/a-cyber-attack-on-your-identity-provider-what-you-need-to-do-now" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/infoguard-blog-cyber-attack-auf-identitiy-provider.png" alt="infoguard-blog-cyber-attack-on-your-identitiy-provider-en" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Security incidents are always a cause for concern, but this is especially true in the case of Okta a few months ago, where an identity provider and possibly their own company were compromised as a result. Despite the fact that, according to a statement from Okta themselves, only a small percentage of its customers were impacted in this instance, this attack is not an isolated case. Consequently, some companies are currently asking themselves how an attack on their identity provider would affect their own company. What measures should they take? In this blog article, we will look at these questions.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/a-cyber-attack-on-your-identity-provider-what-you-need-to-do-now" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/infoguard-blog-cyber-attack-auf-identitiy-provider.png" alt="infoguard-blog-cyber-attack-on-your-identitiy-provider-en" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Security incidents are always a cause for concern, but this is especially true in the case of Okta a few months ago, where an identity provider and possibly their own company were compromised as a result. Despite the fact that, according to a statement from Okta themselves, only a small percentage of its customers were impacted in this instance, this attack is not an isolated case. Consequently, some companies are currently asking themselves how an attack on their identity provider would affect their own company. What measures should they take? In this blog article, we will look at these questions.</p> <img src="https://track.hubspot.com/__ptq.gif?a=1865239&amp;k=14&amp;r=https%3A%2F%2Fwww.infoguard.ch%2Fen%2Fblog%2Fa-cyber-attack-on-your-identity-provider-what-you-need-to-do-now&amp;bu=https%253A%252F%252Fwww.infoguard.ch%252Fen%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Breach Detection Fri, 21 Oct 2022 06:51:29 GMT michelle.gehri@infoguard.ch (Michelle Gehri) https://www.infoguard.ch/en/blog/a-cyber-attack-on-your-identity-provider-what-you-need-to-do-now 2022-10-21T06:51:29Z NIS 2 – an overview of the EU’s new Cyber Security Directive https://www.infoguard.ch/en/blog/nis-2-an-overview-of-the-eu-new-cyber-security-directive <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/nis-2-an-overview-of-the-eu-new-cyber-security-directive" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-nis-2-eu-richtlinie-datenschutz.jpg" alt="infoguard-nis-2-eu-richtlinie-datenschutz" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">The EU, with its new NIS 2 cyber security directive, is aiming to bring greater resilience to the entire infrastructure. To date, many industries have been largely unaffected by such concepts, but now it’s time to take things seriously. Companies failing to follow suit will be facing heavy fines. In this article, we take a closer look at NIS 2 and explain why the new EU directive is also applicable to Swiss companies.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/nis-2-an-overview-of-the-eu-new-cyber-security-directive" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-nis-2-eu-richtlinie-datenschutz.jpg" alt="infoguard-nis-2-eu-richtlinie-datenschutz" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">The EU, with its new NIS 2 cyber security directive, is aiming to bring greater resilience to the entire infrastructure. To date, many industries have been largely unaffected by such concepts, but now it’s time to take things seriously. Companies failing to follow suit will be facing heavy fines. In this article, we take a closer look at NIS 2 and explain why the new EU directive is also applicable to Swiss companies.</p> <img src="https://track.hubspot.com/__ptq.gif?a=1865239&amp;k=14&amp;r=https%3A%2F%2Fwww.infoguard.ch%2Fen%2Fblog%2Fnis-2-an-overview-of-the-eu-new-cyber-security-directive&amp;bu=https%253A%252F%252Fwww.infoguard.ch%252Fen%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Data Governance Fri, 07 Oct 2022 06:30:00 GMT reinhold.zurfluh@infoguard.ch (Reinhold Zurfluh) https://www.infoguard.ch/en/blog/nis-2-an-overview-of-the-eu-new-cyber-security-directive 2022-10-07T06:30:00Z [Q&A] Access to authentication tokens from Teams accounts – What’s that all about? https://www.infoguard.ch/en/blog/access-to-authentication-tokens-from-teams-accounts-whats-that-all-about <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/access-to-authentication-tokens-from-teams-accounts-whats-that-all-about" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-cyber-security-blog-data-privacy-strategy-datenschutz.jpg" alt="infoguard-zugriffs-auf-authentisierungstokens-von-team-accounts-was-ist-dran" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><strong>Our partner Vectra has recently published an <a href="https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens">article</a>, which describes how, under certain circumstances, attackers can gain access to teams accounts’ authentication tokens. There have been a lot of questions about this from our customers, so we have decided to summarise and analyse the most important information here.</strong></p> <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/access-to-authentication-tokens-from-teams-accounts-whats-that-all-about" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-cyber-security-blog-data-privacy-strategy-datenschutz.jpg" alt="infoguard-zugriffs-auf-authentisierungstokens-von-team-accounts-was-ist-dran" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><strong>Our partner Vectra has recently published an <a href="https://www.vectra.ai/blogpost/undermining-microsoft-teams-security-by-mining-tokens">article</a>, which describes how, under certain circumstances, attackers can gain access to teams accounts’ authentication tokens. There have been a lot of questions about this from our customers, so we have decided to summarise and analyse the most important information here.</strong></p> <img src="https://track.hubspot.com/__ptq.gif?a=1865239&amp;k=14&amp;r=https%3A%2F%2Fwww.infoguard.ch%2Fen%2Fblog%2Faccess-to-authentication-tokens-from-teams-accounts-whats-that-all-about&amp;bu=https%253A%252F%252Fwww.infoguard.ch%252Fen%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cyber Risks Wed, 28 Sep 2022 09:17:39 GMT mathias.fuchs@infoguard.ch (Mathias Fuchs) https://www.infoguard.ch/en/blog/access-to-authentication-tokens-from-teams-accounts-whats-that-all-about 2022-09-28T09:17:39Z Opening of the new InfoGuard Cyber Defence Center for your security – 24/7 https://www.infoguard.ch/en/blog/opening-of-the-new-infoguard-cyber-defence-center-for-your-security-24/7 <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/opening-of-the-new-infoguard-cyber-defence-center-for-your-security-24/7" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/infoguard-blog-er%C3%B6ffnung%20cdc%203.0.png" alt="infoguard-blog-eröffnung-cdc-en" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Beginning of September, following a period of construction lasting just under three months, we opened the new, ultra-modern Cyber Defence Center (CDC), which is over twice the size of the previous one, and a spacious extension to the office space at our location in Baar. One of the most modern Cyber Defence Centres in Switzerland has been created covering an area of 550m2. You can read all the details of the new CDC in this blog article.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/opening-of-the-new-infoguard-cyber-defence-center-for-your-security-24/7" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/infoguard-blog-er%C3%B6ffnung%20cdc%203.0.png" alt="infoguard-blog-eröffnung-cdc-en" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="font-weight: bold;">Beginning of September, following a period of construction lasting just under three months, we opened the new, ultra-modern Cyber Defence Center (CDC), which is over twice the size of the previous one, and a spacious extension to the office space at our location in Baar. One of the most modern Cyber Defence Centres in Switzerland has been created covering an area of 550m2. You can read all the details of the new CDC in this blog article.</p> <img src="https://track.hubspot.com/__ptq.gif?a=1865239&amp;k=14&amp;r=https%3A%2F%2Fwww.infoguard.ch%2Fen%2Fblog%2Fopening-of-the-new-infoguard-cyber-defence-center-for-your-security-24%2F7&amp;bu=https%253A%252F%252Fwww.infoguard.ch%252Fen%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cyber Defence IT Security Fri, 23 Sep 2022 11:15:28 GMT mirjam.burkard@infoguard.ch (Mirjam Burkard) https://www.infoguard.ch/en/blog/opening-of-the-new-infoguard-cyber-defence-center-for-your-security-24/7 2022-09-23T11:15:28Z Cyber defence demands expertise in cyber security, legal and risk transfer https://www.infoguard.ch/en/blog/cyber-defence-demands-expertise-in-cyber-security-legal-and-risk-transfer <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/cyber-defence-demands-expertise-in-cyber-security-legal-and-risk-transfer" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-cyber-defence-braucht-expertise.jpg" alt="Cyber defence demands expertise in cyber security, legal and risk transfer" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="text-align: left;"><strong>There are new cyber attacks taking place on companies every day, and the quality, efficiency and professionalism of the attacks are getting constantly better. It is quite common for it to take days, weeks, even months for a successful attack to be uncovered. Given this situation, it is crucial to make greater investment in order to detect cyber attacks in order to be able to react and cope with the worst-case scenario. In this article, you will find out why experts working in the cyber security, legal and risk transfer sectors are all required.</strong></p> <div class="hs-featured-image-wrapper"> <a href="https://www.infoguard.ch/en/blog/cyber-defence-demands-expertise-in-cyber-security-legal-and-risk-transfer" title="" class="hs-featured-image-link"> <img src="https://www.infoguard.ch/hubfs/images/blog/infoguard-cyber-defence-braucht-expertise.jpg" alt="Cyber defence demands expertise in cyber security, legal and risk transfer" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p style="text-align: left;"><strong>There are new cyber attacks taking place on companies every day, and the quality, efficiency and professionalism of the attacks are getting constantly better. It is quite common for it to take days, weeks, even months for a successful attack to be uncovered. Given this situation, it is crucial to make greater investment in order to detect cyber attacks in order to be able to react and cope with the worst-case scenario. In this article, you will find out why experts working in the cyber security, legal and risk transfer sectors are all required.</strong></p> <img src="https://track.hubspot.com/__ptq.gif?a=1865239&amp;k=14&amp;r=https%3A%2F%2Fwww.infoguard.ch%2Fen%2Fblog%2Fcyber-defence-demands-expertise-in-cyber-security-legal-and-risk-transfer&amp;bu=https%253A%252F%252Fwww.infoguard.ch%252Fen%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cyber Defence Cyber Risks Wed, 14 Sep 2022 06:30:00 GMT reinhold.zurfluh@infoguard.ch (Reinhold Zurfluh) https://www.infoguard.ch/en/blog/cyber-defence-demands-expertise-in-cyber-security-legal-and-risk-transfer 2022-09-14T06:30:00Z