Tech

Emotet: self-protection instead of consultant analysis | heise online

Emotet still poses a threat to companies. But instead of leaving it with a security analysis carried out by external consultants based on established facts, as is so often the case, those responsible should take the reins into their own hands and prepare their security infrastructure. The new iX 2/2021 shows how to tackle such a self-test.

In this way, potential weak points can be identified in advance with a systematic analysis of your own IT landscape, which is then compared with the currently widespread malware. And such a self-test pays off, because prevention is not only easier, but also cheaper than cleaning up after a successful attack by criminals.

Another theme of the new FebruaryiX is AMD’s second Zen generation: In Lenovo’s ThinkSystem SR665, the CPU architecture must show how much more power two processors in one system can offer. The top model is not always worthwhile, because in many areas of application models with fewer cores but the same size L3 cache achieve high performance values.

In addition, several articles take a closer look at knowledge management in the company, especially after Atlassian’s move to the cloud. On the one hand, a market overview shows which wiki systems are available for companies and how they differ. Furthermore, the best practices show what a practical and user-oriented basic concept looks like.

The iX 2/2021 is now available in well-stocked magazine and train station bookshops or in the Heise shop:


More from iX magazine


More from iX magazine


(fo)

To home page

.