Knowledge-Base
English
Deutsch
Sign in
Deutsch
uncategorized
Privacy
InfoSec
General InfoSec FAQ
Integrations
uncategorized
DCO
AML
Employees
Back to home
Knowledge-Base
uncategorized
Privacy
InfoSec
General InfoSec FAQ
Integrations
uncategorized
DCO
AML
Employees
uncategorized
How can possible security gaps be identified?
What are (event) logs and how do logs work?
What is Mobile Device Management?
What is the difference between a mobile device management and a container solution?
What options are there for regulating the use of private devices in a professional context?
How should permissions be assigned?
What is a demilitarised zone (DMZ)?
Does an ISMS apply to my entire company? Can I define the scope of my ISMS myself?
What is meant by Single-Sign-On (SSO)
Employee Training (Onboarding)
What is a Virtual Private Network (VPN)?
What is an asset and what assets should be included in an asset register?
What types of encryption are available?
May I contact consumers by phone without prior consent to present our products or services? (cold calling)
How should a backup concept be created and what should be considered?
ROPA-Controller