A-SQUARE GmbH - Consulting&More
  • Start
  • Our offer
    • IT checks & optimization
    • Digital transformation
    • project management
    • Infrastructure
    • IT security
    • Software
    • Website creation
    • Hosting and domain management
  • Our partners
    • ELO
    • HAGGLA Software Solutions GmbH
    • HS - Hamburger Software
      • Document management
      • Order processing
      • Financial accounting
    • Salesforce
    • ZEP
  • About us
    • Career
  • contact us
  • en_US
    • de_DE
Start
Our offer
    IT checks & optimization
    Digital transformation
    project management
    Infrastructure
    IT security
    Software
    Website creation
    Hosting and domain management
Our partners
    ELO
    HAGGLA Software Solutions GmbH
    HS - Hamburger Software
    Document management
    Order processing
    Financial accounting
    Salesforce
    ZEP
About us
    Career
contact us

    
A-SQUARE GmbH - Consulting&More
  • Start
  • Our offer
    • IT checks & optimization
    • Digital transformation
    • project management
    • Infrastructure
    • IT security
    • Software
    • Website creation
    • Hosting and domain management
  • Our partners
    • ELO
    • HAGGLA Software Solutions GmbH
    • HS - Hamburger Software
      • Document management
      • Order processing
      • Financial accounting
    • Salesforce
    • ZEP
  • About us
    • Career
  • contact us
  • en_US
    • de_DE
General, Business, Consulting, IT security, Support

WhatsApp Phishing: When Help Turns into a Trap

October 28, 2025 by Anja Fritsch No Comments
Do you mind voting for my niece? – such messages may seem harmless, but they are often part of a global phishing campaign. Cybercriminals lure users to fake voting pages and hijack their WhatsApp accounts using a clever trick.

Continue reading
Infrastructure, IT security, Legal aspects

Cybersecurity: Why Cost-Cutting Measures Can Be Expensive for Businesses

September 11, 2025 by Alexander Christanell No Comments
In an increasingly digital world, cybersecurity is no longer optional – it’s business-critical. Yet many companies still neglect adequate investment in IT security, often due to cost concerns

Continue reading
AI, General, BigData, Change management, Consulting, IT security, project management, process optimization, Software

Artificial intelligence as a door opener - How AI is revolutionizing information security

December 16, 2024 by Anja Fritsch No Comments
In today's digital world, protecting information is becoming increasingly important. Cyber attacks are becoming more sophisticated and the amount of data is growing exponentially. Companies are faced with the challenge of protecting sensitive information around the clock.

Continue reading
Consulting, Digitalization, IT security, project management

The NIS2 Directive: new standards for cybersecurity

October 18, 2023 by Alexander Christanell No Comments
Demand for the NIS2 Directive brings far‑reaching changes to cybersecurity in Europe. With the revision of the previous NIS Directive, key aspects of information and network security are moving even more into focus.

Continue reading
Digitalization, IT security

Building trust in digitalization, AI, and cloud technologies

August 1, 2022 by Verena Angerer No Comments
Data protection scandals in recent years have left a deep mark on the collective memory of users and have led to a noticeable decline in trust in the security of digital communication.

Continue reading
General, Business, Consulting, IT security

Our Tip: Investment subsidy cybersecurity

April 1, 2022 by Anja Fritsch No Comments
Leveraging a new opportunity available since April 1st, companies can now benefit from an especially attractive funding program for cyber‑security investments. Eligible projects are those that sustainably improve a company’s IT and cyber security.

Continue reading
Business, Editor's choice

Tips for secure passwords

April 6, 2021 by Alexander Christanell No Comments
Every day, passwords accompany us — whether on Facebook, online banking, or when logging into email accounts. They act as a digital ID and protect our data from unauthorized access. Especially after cyberattacks, the same question always arises:

Continue reading

Categories

  • AI
  • General
  • BigData
  • Business
  • Change management
  • Consulting
  • DataMining
  • Digitalization
  • Editor's choice
  • ESG
  • Funding
  • Birthday
  • Infrastructure
  • IT security
  • Sustainability
  • project management
  • process optimization
  • Legal aspects
  • Training
  • Software
  • Supply Chain Management
  • Support
  • Transformation

Recent Posts

  • Requirements instead of a cost trap – Why companies seek independent consulting
  • KMU.DIGITAL 2026 – Your Current Funding Opportunities
  • Merry Christmas and a successful New Year!
  • A-SQUARE at FutureHub: e-Doc – Your Partner for Digital Processes
  • WhatsApp Phishing: When Help Turns into a Trap

Socialize with me

XINGLinkedInGTCImprint/Data protectioncontact us
© 2021 copyright A-SQUARE GmbH
Manage cookie consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service expressly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that have not been requested by the subscriber or user.
Statistics
Technical storage or access for statistical purposes only. Technical storage or access used solely for anonymous statistical purposes. Without a subpoena, the voluntary consent of your Internet service provider or additional records from third parties, the information stored or accessed for this purpose alone cannot generally be used to identify you.
Marketing
The technical storage or access is necessary to create user profiles, to send advertising or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}