News. Old Entries. Archive.
Vibe 4.0.8 is released and includes the following:
- Fixes for costumer related bugs
- Security updates
The following bugs have been fixed:
28069 Vibe does not search on terms inside tables.
28067 Using Excel 2016: trying to save changes to xlsx file always leads to “Upload Failed” when using do.jnlp.
27089 Filenames with extended characters no longer accessible after upgrade to 4.0.7
28059 “Edit In Place” in word and excel complains that another user has changed the entry.
27059 Blog notification email will not display image for recipient.
LUCY webinar on the security awareness study 2020: what are the effective benefits of awareness programs?
Presentation of the results in a LUCY webinar on September 29th, 2020!
The study report particularly addresses the findings in the DACH region and deals with the following questions, among others:
• Why is there a high relevance of cybersecurity awareness for any IT security strategy?
• What are the most common challenges when implementing security awareness measures?
• What are the specific benefits for the company?
• How do the awareness measures affect the workforce?
• Does cybersecurity awareness affect the corporate culture?
Additionally, Samantha Danilowski, IT Enterprise Security Robert Bosch LLC, will talk about the development of the Bosch internal awareness program and show how valuable it is to have trained and sensitive users.
After the presentation, the speakers will be available to answer questions.
Micro Focus Vibe has once again listened to its customers and has released Micro Focus Vibe 4.0.7. This version includes numerous bug fixes and better transport security by forcing TLS 1.2.
If you have any questions regarding the new features, the update or the installation and use of Micro Focus Vibe please contact us. We look forward to helping you.
We are LUCY partners!
Consulting, support, licenses and support
Lucy Security is the leading privacy-compliant solution for testing, training, education, and monitoring the security behaviour of employees using the Internet.
With LUCY, companies can assume the role of a fictitious attacker (phishing simulation) and identify gaps in both technical infrastructure and human security awareness – and eliminate these gaps through a comprehensive e-learning feature. Lucy can be installed inside the organisation’s network (on-premise). No data leaves the organisation, nothing is transferred to the cloud, the organisation (and also the staff council/workers council) have complete control over the processing of data that is worthy of rigorous protection.
Phishing simulations provide a secure learning environment in which employees can experience how they would react to real cyber attacks. Phishing simulations generate awareness of email and Internet threats and make employees receptive to training and education.
Lucy has an integrated learning management system (LMS) with over 200 interactive training and education modules. Lucy e-learning can be made available to employees in a flexible manner, independently of running a phishing simulation and even offline. An integrated authoring system and a SCORM interface make it easy to integrate new content that is specifically tailored to the needs of your organization.
Lucy’s testing tools help you determine how safe your information infrastructure is from cyber attacks.
From an attacker’s perspective you can observe:
- the weak points of your mail and web infrastructure as well as the application programs on the computers of your employees,
- the information about your organization on the Internet and on the dark web, which a hacker also uses to prepare his attack.
Help is only useful if it’s available right when you need it! Lucy’s emergency button (plugin for Outlook, Gmail and Office365) reminds employees that email is an unsafe thing and tells them in seconds if a dubious-looking email is really dangerous.
With little effort for users and IT-Service desk…
- suspicious mail is automatically analyzed,
- Users caution is rewarded,
- and training/education measures are integrated.
Code and Concept is a certified Lucy Eco-System Partner and supports you in planning, implementing and operating Lucy in your organization through
- Consulting and Workshops
- Handling the licensing of Lucy
- technical support
- Planning and implementation of awareness-raising campaigns
- penetration tests
Please do feel free to contact us! – Together with you, we will identify your needs and define the next steps. Our Human Factors specialist Dr. Werner Degenhardt is the right man for you to talk to!
Information Security in the IT
Lecture at the DILK event by Dr. Werner Degenhardt
The DILK event
The DILK (Deutscher IT-Leiter Kongress) event is Germany’s largest specialist congress for IT managers and takes place regularly in Düsseldorf. At the congress, prominent speakers offer interesting lectures and exciting workshops for IT managers who want to advance digitisation and to design the IT structure of their company in a modern and secure way. In between the sessions and talks, there is time for water cooler conversations and for break outs – there is always the opportunity for networking and exchange between peers.
The DILK 2019 event at its core concerned itself with digitization, networking, the potential of artificial intelligence, cloud computing, information, data and cyber security, leadership strategies and the shortage of skilled workers.
DILK 2019 was attended by 1400 participants, and the next date is already fixed: from 28 to 30 September 2020 – also in Düsseldorf.
Dr. Werner Degenhardt: Human Factors in Information Security – Phishing
Bearing responsibility in IT means not only keeping the technology running, but also taking care of the people who operate and use the technology.
“Phishing” is currently the most important attack vector on information security. Dr. Degenhardt of Code and Concept illustrated in his talk “Psychology in IT – why people fall for phishing” how phishing has long since become stable source of income for organized crime.
In phishing attacks, employees unintentionally become accomplices of the attackers: in more than 95% of all successful cyber attacks, the behavior of the operator or user is the cause and prerequisite for the success of the attack.
Imprudent behavior of employees with regard to information security and data protection is the most significant and most serious threat to security. The lecture was addressed to all IT managers who want to counter this threat.
People make mistakes
Humans are the weakest link in the security chain. Phishing mails are not recognized, content and structure of the mails tempt employees to go to infected websites, enter login data into web forms and open dangerous attachments. Dr. Werner Degenhardt explained vividly and comprehensively – even incorporating the live audience – how humans function, how phishing e-mails can be recognized, and which possibilities sensitization campaign and trainings offer us to improve the behavior of employees.
Dr. Werner Degenhardt was Academic Director of the Faculty of Psychology and Education at the Ludwig Maximilian University in Munich. His research focuses on human factors in information security, social relationships online and human computer interaction.
Since 2018, Dr. Werner Degenhardt has been in charge of information security and data protection at Code and Concept and conducts awareness-raising campaigns, trainings and courses for companies and public institutions to harden the human firewall.