Here we share our expertise, learnings and news


Exit restrictions, social distancing, home office – many of us are currently working from home and are therefore mostly alone. But are we really alone, socially distant, and thus safe?

No. Quite the opposite: We are all exposed these days – to cyber attackers!

Very few of us regularly work in home office.

Thus, the spontaneous solutions that many currently use do not always meet the IT security requirements that we would normally demand of them.

This opens many doors for those who are looking for information and data from our companies.

So, what can we do in the short term to protect ourselves in the current situation?

The German Federal Cyber Security Authority (BSI) recommends the following
“Top 5 for IT security in home office”:

Clearly regulated: Unambiguous and binding regulations on IT security and the security of data in paper form are essential and should be communicated clearly and in writing to everyone involved.

There is nothing to see here: Home office should be as close to the company office as possible in terms of security.
Lock your devices when you are not using them.
Close doors when you leave the workplace.
Make sure that third parties cannot look at your screen through visible or open windows.

Clear verification: Use only trustworthy communication channels.

Beware of phishing: Many attackers are taking advantage of the current situation and could try to gain access to sensitive data by exploiting fears, obtaining information about remote access or resetting passwords.

VPN: If possible, you should only access your institution’s resources via secure communication channels.
One possibility for this is cryptographically secured virtual private networks (VPN).

Learn more about IT security with University4Industry.

Here you will find more information.

Or simply contact us at:

More information and links to further resources can be found on the BSI website.


Free Checklist

Almost every day, well-known companies find themselves in the headlines because they have been the victim of a cyberattack. For a long time now, security training and the development of measures have no longer been about the question of whether one will be affected, but when and to what extent. However, this does not mean that manufacturing companies should just sit and wait until the time comes. In this paper, we have listed what companies can do in advance to delay attacks and be as resilient as possible to attacks.

Sign up now to learn what you can do ALREADY to prepare best for a possible ransomware attack.

After you filled out the form, you will receive an email from us with the free white paper. Please check your spam folder in case your message got stuck there. Please

Schedule an appointment now

Would you like to learn more about our approach?

Have a conversation with one of our experts
about how we as your partner could support you.

By entering your email address, you will accept our privacy policy and receive a confirmation email. Through this email, you have the chance to subscribe to our regular updates. Without your permission, you will not receive our newsletter.

Jetzt Termin vereinbaren

Sie möchten mehr über unseren Ansatz erfahren?

Sprechen Sie mit einen unserer Expert*innen,
wie wir Sie als Partner am besten unterstützen dürfen.

Wenn Sie Ihre E-Mail-Adresse eingeben, akzeptieren Sie unsere Datenschutzbestimmungen und erhalten eine Bestätigungs-E-Mail. Mit dieser E-Mail haben Sie die Möglichkeit, unsere regelmäßigen Updates zu abonnieren. Ohne Ihre Zustimmung werden Sie unseren Newsletter nicht erhalten.