Business Email Compromise: When Cybercriminals Imitate CEOs

A very warm hello! Email is still one of the most important means of communication in everyday business. Invoices are released, payments are confirmed and confidential information is exchanged. It is precisely this trust that cybercriminals exploit. One of the most dangerous and successful scams in recent years is Business Email Compromise (BEC). In a business email compromise, attackers present themselves as trustworthy [...]
External Attack Surface Management: The Blind Spot of Your IT

A very warm hello! Many companies invest significant sums in their IT security architecture. Firewalls, EDR, SIEM and zero-trust models are standard today. This ensures a good feeling of security – and is also right. But despite these investments, successful cyberattacks continue to increase. Phishing, fake domains, compromised social media accounts or data leaks hit organizations of all sizes. The reason for this is [...]
Dark Web Monitoring: Find Stolen Data Before It Burns

A very warm hello! In today’s digital world, corporate data is a valuable target for cybercriminals. What many do not know, however, is that dangerous data leaks and hacker attacks can often be traded on the dark web months before they become a real problem. If companies do not perform regular dark web monitoring, they risk that their data will be long unnoticed by [...]
NIS-2: Urgent need for action for companies – procrastination is expensive!

Development December 2025 With the entry into force of the NIS 2 Implementation Act on 6. By December 2025, there is an urgent need for action for many companies. There are no transitional periods – the new requirements apply immediately. Especially the management is required, because in the case of lack of care, they can also be held personally liable. The European NIS 2 Directive has now been fully transposed into national law. [...]
Is EU data in danger? What the new legal opinion reveals about US authorities accesses.

A recent legal opinion of the University of Cologne, published on behalf of the Federal Ministry of the Interior, examines the legal situation in the USA with regard to the access of US authorities to data – even if it is stored in Europe. The core of the report is that several US laws – most notably the CLOUD Act, the Foreign Intelligence Surveillance Act (FISA) and the Stored [...]
Annual Review: Company Newspaper TWINFO

A very warm hello! Another year is drawing to a close – marked by exciting impressions, valuable encounters and new experiences! As usual, we celebrate the end of the year with our company magazine TWINFO. In it we would like to invite you to look back with us on the most beautiful moments of the past year – the link can be found below. In [...]
Actively Shaping Digital Sovereignty: Practical Strategies for Companies

A very warm hello! In the first two blog posts, we highlighted what digital sovereignty means and what the current status in Europe looks like – including the risks of dependence on global providers and specific cases such as the International Criminal Court or European administrations that deliberately use alternatives. In this third part we want the bridge to [...]
Digital sovereignty: Real status quo: risks, dependencies & current cases from Europe

A very warm hello! In our first blog post, we explained what digital sovereignty means, why it is now a strategic pillar of IT security for companies and how European initiatives such as GAIA-X, NIS2 or the Cyber Resilience Act (CRA) support companies to strengthen their digital independence. In this post, we build on this and take a look [...]
Digital sovereignty: Why it is becoming the strategic pillar of modern IT security today

A very warm hello! The digital landscape is increasingly becoming a decisive success factor for companies – and at the same time one of the biggest risk areas. With every new cloud application, every AI service and every global software, the question arises more urgently: Who actually has control over our data, our systems and our security processes?
We make your company safer!

A very warm hello! IT security is a complex issue. However, it is necessary to think early about protecting digital infrastructures before an external attack leads to significant damage. IT consulting and especially consulting for IT security act as a helping hand when it comes to protecting yourself from threats, [...]