Phone call Mail
Now free initial consultation by mail or phone: +49 228 - 33 88 89 0

The EnBITCon Blog

SonicOS 7 – Wie Firewalls echte Business-Enabler werden

Moderne Firewalls sind weit mehr als Schutzmechanismen. In vielen Unternehmen übernehmen sie heute zentrale Rollen im...
Published on 12 December 2025 SonicWall   SonicWall, IT-Security, Management, Firewall

Wi-Fi Backscatter: What’s behind it — and how to realistically assess the risk

“I’m not even connected to the Wi-Fi…” — that’s no longer something you can rely on. With Wi-Fi backscatter, it is th...
Published on 5 December 2025 On our own behalf   Sicherheitsrisiken, Cybersecurity

QRishing (Quishing): When QR Codes Become a Phishing Trap

QR codes are everywhere: on parcels, parking meters, posters, invoices, access cards. That’s exactly what makes them...
Published on 28 November 2025 On our own behalf   Sicherheitsrisiken, Cybersecurity, Tipps

Data Mesh vs. Data Lake – Which approach is right for you?

Companies collect more data than ever—but the real value only emerges when teams can work with it quickly, reliably...
Published on 21 November 2025 On our own behalf   Cybersecurity, Governance

Fail Friday: Screen Sharing & Personal Hotspot — Common Mistakes and Quick Fixes

Welcome to our Fail-Friday! Every second Friday of the month, we share anonymized little mishaps from everyday IT lif...
Published on 14 November 2025 On our own behalf   Hotspot, Sicherheitsrisiken, Technologie