All posts by Roman Usiatycki

  • Signal Messenger App auf Smartphone
    Blog article

    IT Security

    Cyberattack Signal

    Although the messaging service Signal is considered particularly secure, attackers were still able to successfully access data—not by cracking the technology, but by exploiting human interaction. Modern cybersecurity is based on two crucial factors: strong technical protection and proper human…
  • UEM Admin
    cybercrime, hacking and technology concept - male hacker in dark room writing code or using computer virus program for cyber attack
    Blog article

    IT Security

    Cyberattack on Stryker – and 6 Security Tips

    The cyberattack on the medical technology company Stryker Corporation in the U.S. serves as a reminder that powerful centralized endpoint management solutions are not only ideal for managing large device fleets and systems, but also pose a significant risk if…
  • Device Management
    Blog article

    Apple, EBF News, Workplace Management

    UEM change: EBF Onboarder vs Apple’s new migration option

    In 2015, EBF launched EBF Onboarder, a tool that enables the automated migration of devices, regardless of whether they run on iOS, macOS, Android, or Windows. We have migrated nearly 3 million devices to date and impressed users and administrators…
  • Blog article

    Apple, Workplace Management

    WWDC 2025: What becomes relevant for administrators

    WWDC 2025 had some exciting innovations in store – especially for IT administrators and UEM managers. While the keynote address was aimed at a broad audience, the technical sessions presented numerous innovations that will bring about significant changes in modern…
  • Blog article

    EBF News, Workplace Management

    Four success factors for a successful UEM migration

    We are currently seeing more and more companies wanting to change their UEM model. The reasons for this vary: scarce resources, increasing security requirements, changed licensing models, cost pressure. As experts in various UEM systems, we recommend comparing the respective…
  • EBF Kollege im Gespräch
    Blog article

    Workplace Management

    Windows 10 End of Life: What Administrators Should Know and Do

    Official support for Windows 10 will end on October 14, 2025. For IT administrators who manage complex corporate environments, this deadline poses a number of challenges – ranging from security risks to hardware compatibility issues. Together with Roman Usiatycki, Team…
  • E-book Managed Services
    E-book

    Modern Work Tools, Workplace Management

    E-book: UEM without compromise – Managed services for maximum relief

    Get inspired by our e-book on how managed services for UEM systems can turn daily IT tasks into real progress.
  • E-book Security
    E-book

    IT Security

    E-book: The EBF Security Compass – With all our knowledge

    Our IT security compass offers practical insights and strategies for greater cyber resilience—through strategic measures, modern security technologies, and employee awareness.
  • cybercrime
    Blog article

    IT Security

    3 Key Strategies for Defending Against Phishing Attacks

    Whether it’s curiosity, time pressure, or fear—psychological tricks play a major role in cyberattacks and, unfortunately, are all too often successful. But they are just one reason why the threat in the digital space is greater than ever before. Cybercriminals…
  • E-book Mac Management
    E-book

    Apple, Workplace Management

    E-book: Successful Mac management – for greater employer appeal

    Our e-book shows why Macs create real added value in businesses—and how they can be managed easily, securely, and efficiently.
This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.