At Trufflepig Forensics, we see hacked systems, encrypted hard disks, or damage caused by phishing attacks in our daily work with companies. The reasons for this are always similar mistakes that lead to these problems. In this series, our CTO Christian Müller reports on the most common mistakes and how to avoid them.
Hint: For your convenience, a machine has translated this text. To provide an accurate translation, reasonable efforts have been made. Nevertheless, no automated translation is perfect, and errors may occur. The official version of this text is the German one.