MATESO blog

The 5 most common cyber threats and how to protect yourself
The IT security situation in Germany is tense. In 2019 alone, the Federal Criminal Police Office recorded over 100,000 reported cyberattacks in Germany, and the number of unreported cases is probably much higher. To understand how companies and private individuals can protect themselves, you first need to understand what the different types of hacker attacks are.

Notification: “Your password has been compromised”
“Data breach”, “Data leak”, “Your password has been compromised”. Not only do nightmarish scenarios play out in your head when you hear these words, but you inevitably wonder: what’s the right thing to do now? In this post, you’ll learn how to find out if your passwords have been compromised, and if they have – what to do about it.

IT security projects: How to get the works council on board
You’ve finally decided on a new password manager. But then comes the question: “Have you actually talked to the works’ council?” But after a short presentation to the works’ council, their decision follows immediately: a veto! In this blog post we will tell you how you can avoid such an outcome and win over the works’ council as soon as possible.

5 Findings from the National Reports on Cybercrime 2020
The German Federal Criminal Police Office has published the National Situation Reports on Cybercrime 2020. How the cybercrime sector is developing, which companies and institutions are most at risk and what is meant by cybercrime-as-a-service – we take a closer look at the data.

Tips for safe screen sharing in home office times
The Corona pandemic has catapulted employees into the home office in record time and radically changed ways of working. Screen sharing, a method of sharing your own screen with others, is becoming increasingly important in the home office as conferences, meetings and webcasts are held online only. You can learn about the dangers of this and how to avoid them in this blog post.

More Cyber Security in just 19 Minutes
Cyber security is a complex topic that small and medium-sized enterprises in particular often devote too little time to due to a lack of resources. But even small adjustments can make a big difference. In our latest blog post, we reveal how you can sustainably improve your cyber security in just 19 minutes and why this is particularly important in Germany.

5 tips for a secure master password
With Password Safe you only need to remember one password: your master password. This password should be as secure as possible and protect the credentials stored in Password Safe from unauthorized access. So in this blog post, we are going to reveal five tips for a good master password that will make things really difficult for hackers and other password thieves.

Why IT needs to listen particularly carefully when it comes to home offices
Our working world is changing: more and more employees are working remotely, agilely and digitally together. For an effective and pleasant home office experience, however, the right IT infrastructure is important. IT departments must not simply shrug their shoulders at these challenges but must listen to their colleagues. Because only those who ask questions can reveal potential for improvement and introduce the right measures.

Shop locally: IT security made in Germany
Shopping locally is already common practice in the supermarket. Short distances, local contacts, greater transparency – these are just some of the many advantages. So why should your password manager come from the US? Find out in the following blog post why the “Made in Germany” label is essential for your IT security.

Password Management: 4 tips on how to get every employee on board
You’ve purchased the software and installed it on all computers. You’ve conducted training. You told everyone to always and only use Password Safe. But you still find post-its with confidential login information on the screens of your employees and colleagues. Because rolling out new tools is a complex, often underestimated process that takes time and preparatory work. We will show you how you can achieve a rollout with high user acceptance!