Skip to navigation Skip to navigation Skip to search form Skip to login form Skip to main content Skip to accessibility options Skip to footer
Skip accessibility options
Text size
Line height
Text spacing

Log in using your account on:

MicrosoftContinue with Microsoft
or
Show
Forgotten your username or password?
silhouette.nextbeststep.atsilhouette.nextbeststep.at

Log in

Log in using your account on:

MicrosoftContinue with Microsoft
or
Show
Forgotten your username or password?

    Home


    Welcome to the information security training portal

    Information security is a team sport! Everyone can make a contribution to this. You can find out how this works and what you need to know on this page.
     

    Why information security at all?

    Cybercrime against businesses is on the rise and we too need to be on our guard not to become casual victims. The crime statistics speak for themselves: While the crimes are generally decreasing on average in Europe, cybercrime is truly experiencing a boom. Attacks are increasing by more than 60% annually and there is hardly a company that has not already been affected.
    Theft of passwords

    Theft of passwords

    Often there really isn't much more than a password between valuable company data and the bad guys who are pursuing criminal goals with the acquisition. How strong are the passwords you use?
    Theft of passwords
    Homeoffice

    Homeoffice

    Working from home also brings new opportunities for cybercriminals and offers new gateways for malware. The use of mobile devices (laptop, tablet, smartphone) in connection with wireless connections often poses more security risks than you think.
    Homeoffice
    Methods of hacking

    Methods of hacking

    Technical attacks are much more expensive than obtaining desired login data through manipulation and deception. This is what cybercriminals use in phishing or social engineering, where they pretend to be someone other than what they appear to be.
    Methods of hacking
    Data leakage

    Data leakage

    A really unpleasant thing: When important company data is stolen, manipulated or no longer available. Criminals are flexible when it comes to business models.
    Data leakage

    10 golden rules

    Familiarize yourself with the current security risks and follow the guidelines.

    Be careful when dealing with emails.

    Pay attention to your gut feeling - also when dealing with e-mail and the Internet!

    Protect your devices (PC, smartphone, tablet) from unauthorized access.

    Share confidential information only through trusted channels!

    Report suspicious observations.

    Label and handle information according to your classification.

    Use a unique password for each service that only you know!

    Lock the screen or log out of the computer as soon as you leave the workplace.

    Never leave non-employees unattended.

    Computers don't protect information - that's what we humans do with our behavior!

    E-Learnings

    A security incident - what to do?

    Prompt reporting helps!

    It doesn't matter whether errors have happened or you observe something unusual: Decisive action can avoid worse consequential damage.

    servicedesk@silhouette.com
    Last modified: Tuesday, 16 January 2024, 8:00 AM

    Copyright © nextbeststep GmbH

    • deDeutsch
    Scroll to top