uncategorized
- How can possible security gaps be identified?
- What are (event) logs and how do logs work?
- What is Mobile Device Management?
- What is the difference between a mobile device management and a container solution?
- What options are there for regulating the use of private devices in a professional context?
- How should permissions be assigned?
- What is a demilitarised zone (DMZ)?
- Does an ISMS apply to my entire company? Can I define the scope of my ISMS myself?
- What is meant by Single-Sign-On (SSO)
- Employee Training (Onboarding)
- What is a Virtual Private Network (VPN)?
- What is an asset and what assets should be included in an asset register?
- What types of encryption are available?
- May I contact consumers by phone without prior consent to present our products or services? (cold calling)
- How should a backup concept be created and what should be considered?
- ROPA-Controller