Skip to navigation Skip to navigation Skip to search form Skip to login form Skip to main content Skip to accessibility options Skip to footer
Skip accessibility options
Text size
Line height
Text spacing
Show
Forgotten your username or password?
kremslehnerhotels.nextbeststep.atkremslehnerhotels.nextbeststep.at

Log in

Show
Forgotten your username or password?

    Home


    Information Security Training Portal

    Information security is a team sport. Everyone can make a contribution. Here you can find out how and what you need to know in order to do your part.

    Welcome to the training!

    Forgotten your username or password?
    Video abspielenBasic Informationssecurity (Video)

    People, technology and processes must work well together to protect information.

    • People
    • Technology
    • Processes

    People

    Computers do not care about protection of data and information.
    It is up to us to protect information and bear the responsibility for the safe handling of data.

    Technology

    In addition to hardware and software, there are a number of other useful tools that help us protect information. Paper shredders, or  locks, for example.

    Processes

    Processes ensure the interaction between people and technology. They ensure that a desired output is repeatedly achieved.

    Why Information Security?

    Cybercrime is constantly on the rise and we, too, have to be on our guard so as not to become careless victims.

    Crime statistics speak a clear language on this: while offences in general are decreasing, cybercrime is experiencing a veritable boom. Attacks are increasing by more than 60% annually, and there is hardly an organisation that has not been affected by them.
    Show more
    Password theft

    Password theft

    Often, there is really not much more than a password between valuable company data and the bad guys who pursue criminal goals with password acquisition. How strong are the passwords you use?
    Hackers' methods

    Hackers' methods

    Technical attacks are much more expensive than obtaining desired login data through manipulation and deception. This is what cyber criminals do in phishing or social scams, where they pretend to be someone else.
    Data outflow from the company

    Data outflow from the company

    Another really unpleasant thing is when important company data is stolen, manipulated or no longer available. In business models, criminals are creative.
    Working from home

    Working from home

    Working from home brings new opportunities for cyber criminals and offers new gateways for malware. The use of mobile devices in conjunction with wireless connections often poses more security risks than one might think.

    10 golden rules of Information Security

    Familiarize yourself with the current security risks and follow the guidelines.

    Be careful when dealing with e-mails.

    Pay attention to your gut feeling. Also when dealing with e-mail and the Internet!

    Protect your devices (PC, smartphone, tablet) from unauthorized access.

    Share confidential information only through trusted channels!

    Report suspicious observations.

    Label and handle information according to your classification.

    Use a unique password for each service that only you know!

    Lock the screen or log out of the computer as soon as you leave the workplace.

    Never leave non-employees unattended.

    A security incident - So what to do? Keep calm. Report quickly!

    Regardless of whether mistakes have been made or you observe something conspicuous: Decisive action can prevent worse consequential damage.

    0100101011101
    Last modified: Friday, 3 March 2023, 12:36 PM

    Copyright © nextbeststep GmbH

    • deDeutsch
    Scroll to top