SpotON – our blog around digital compliance in enterprises
SpotON – Digital Compliance
Read here regularly on selected topics, developments and news from the areas:
SAM & Cloud – use software legally compliant and cost-effective
IT Security & Threat Intelligence – protect the IT landscape effectively
Data & Digitization – manage digital assets across the lifecycle
Complion Insights – look behind the scenes of digital compliance consultants
21/07/2022
TeamOn: Complion travels to Beilngries in the Altmühl Valley
It's finally summer and our annual team event took place in Beilngries near Ingolstadt, in the beautiful Altmühl Valley. Together we spent a few beautiful days in best weather and finest hospitality – both in front of the laptop and on the water. What we experienced, we want to describe in this blog post.
Complion Insights: Mobile working on flexible time at COMPLION
Flexible work schedules and home offices have become both salvation and memes in the pandemic. While it's clear that many companies have both saved lives and kept their businesses afloat by switching to home working, jokes along the lines of "home office - I'll live in the office from now on" aren't without their shred of truth either. How to find the right balance between relaxed productivity and home office burnout is often determined in large part by corporate culture. In this blog post, you can find out what this looks like at COMPLION with regard to mobile and flexible working.
Emotet, Agent Tesla, ZeuS. These three of the best-known malware families have one thing in common, they all use phishing as a central strategy for their spread. Social engineering strategies, for example in the form of phishing or spear phishing, are often used. The "human vulnerability" therefore continues to be a popular target for attack, which is also confirmed with regard to current studies, such as those conducted by Bitkom.
But how can you protect yourself and your employees from such attacks? This blog post deals with one of the possible approaches to effectively mitigate such threats: so-called sandboxing.
SOC 101 - A Brief Introduction to Security Operation Centers
SOCs are increasingly being used to monitor corporate IT. In the coming weeks, we will therefore take a comprehensive look at this topic. In the first part, we will look at the components and tasks of security operation centers.
New SACS conference: cost-effective software deployment in the spotlight
The SACS Conference will take place in Frankfurt/Main, Germany, on September 21-22, 2022. It focuses on the topics that help user companies to procure their software and cloud services cost-effectively and to use them in compliance with the contract. The conference puts its participants on an equal footing with software and cloud providers when it comes to negotiating and drafting contracts.
Microsoft Professional Support Services – is it all coming down to Unified Support?
As of July 1, 2022, Microsoft will no longer renew Premier Support contracts for existing enterprise customers. Many IT decision-makers are taking the discontinuation of Premier Support as an opportunity to review their strategy for purchasing support services for various Microsoft products.
In consulting, it is important to always keep your knowledge up to date and to improve and further develop procedures that have been tried and tested in practice. For this purpose, Complion organizes the so-called "Knowledge Friday".
A trendy term in recent years has been "digital sovereignty" - a term with different connotations in different contexts. In our article, we will describe these and work out what influence digital sovereignty has on large-scale software use.
Managed services are becoming increasingly important in IT. Software Asset Management as a Service (SAMaaS) is a relatively new field. What maturity level should a SAM organization have in order to purchase SAMaaS in a meaningful way?
Healthier and more environmentally conscious on the road with company bike leasing. Since the end of 2021, our employees have the opportunity to lease a bicycle of their choice (whether with or without a motor) at favorable conditions through our partner Bikeleasing.
Cost increases do not stop at support and maintenance fees for software. One way to reduce costs in the area of software support is to switch to so-called third-party providers, but this entails certain restrictions. This blog post examines the tension between the opportunities and risks of third-party support.
it-sa 365 Webinar 2022: Which information security standard is right for me?
Information security measures have become indispensable in today's world. Especially after the amendment of the German KRITIS Regulation 2021, more and more companies are forced to provide evidence of the functional capabilities of their information security systems. This is done by certifying the ISMS (i.e., information security) according to a recognized standard. The most widely used standards in Germany include the international standard ISO/IEC 27001 and the national standard BSI IT-Grundschutz - But which standard is suitable for your company?