home
SECURITY

According to Verizon's "2019 Data Breach Investigations Report," 36% of data breaches are committed by insiders. Insiders are responsible for 54% of incidents in the healthcare industry and 34% in the public sector. The most recent prominent example is Twitter. Unknown persons have hacked numerous Twitter accounts of celebrities. Via the Twitter profiles of former U.S. president Barack Obama, presidential candidate Joe Biden and Amazon boss Jeff Bezos and many others, the hackers spread advertising for dubious crypto-currency deals. Accounts of companies like Apple and Uber were also affected. The magazine "Vice" reported shortly after the incident that a Twitter insider was responsible for the hack. With the SECURE BOARD 1.0, CHERRY has a solution in its portfolio that effectively tackles problems such as the one suspected here from the hardware side.

Read Now Show less

According to Monster.co.uk, 40% of UK workers are taking the opportunity to work remotely at least once a week, and that 1 in 10 are working from home full-time. Many people now state that they'd turn a job down if working from home isn't offered, yet almost half of employees state that their workplace doesn't have an official policy.

Working from home has to be good for the environment, immediately reducing the pollution caused by vehicle emissions on that daily commute. With everyone conscious of their own carbon footprint, why do workplaces not offer this to more of their workforce?

Read Now Show less

Insights into the digitisation of the German health care system

Even the ancient Egyptians knew how to perform operations on open skulls – and as historical sources reveal, many patients back then were likely to survive and recover from these complicated surgical interventions. While this provides impressive proof of the medical skills mastered by the ancient Egyptians, we should still consider ourselves fortunate that we've made so many advances in the medical field: Modern medicine would be inconceivable without the use of what are, in part, highly complex IT systems – in fact, information technology represents a basic prerequisite for optimum hospital operations today – and helps ensure all sorts of processes proceed without problems over the course of the everyday work done at clinics.

In a healthcare system that has been digitalised to the extent that it is today, universal, nationwide networking is the next logical step. Work on the corresponding project is currently in full swing: What is known as Telematics Infrastructure (TI) involves setting up a secure, digital platform that improves cooperation in the healthcare sector for everyone involved, and ultimately simplifies it as well. All services that are integrated into this TI must be approved by gematik. New components that have been specifically developed for TI, such as the connector or the eHealth card terminal, also require certification by the Federal Office for Information Security (BSI).

Read Now Show less

CHERRY introduces the MC 4900, a wired 3-button mouse with integrated fingerprint reader which allows easy logon and secure authentication. In particular, businesses and public institutions will benefit from this modern security feature. Ease of use and ergonomics are of the usual high CHERRY standards.

Read Now Show less

Aanother one of our products received the Blue Angel certification: the CHERRY KC 1000 The Blue Angel certification provides you, the customer, with reliable information about the effects a product and its manufacturing process have on the environment and health.

Read Now Show less

CHERRY has announced the KC 1000 SC-Z, an extremely secure, corded keyboard with an integrated Class 2 chip card reader. The new smart card keyboard has been manufactured and developed according to the BSI-certified Common Criteria requirements, provides maximum security at the workplace, and saves space on the desk thanks to its 2-in-1 construction. The integrated chip card terminal meets the requirements for electronic signatures, authentication, data encryption, and access authorization.

Read Now Show less