Campari group victims of ransomware attack

Tags: Ransomware, security

Beverage giant Campari Group has become the latest big-name brand to suffer an apparent ransomware attack forcing IT services offline. The Italian firm issued a statement on Tuesday claiming it was hit by a malware attack “presumably” on Sunday November 1. “The groups IT department, with the support of IT security experts, immediately took action to limit the spread of malware in data and systems,” it added. “Therefore, the company has implemented a temporary suspension of IT services, as some systems have been isolated in order to allow their sanitization and gradual restart in safe conditions for a timely restoration of ordinary operations.

Continue Reading

Security Engineer

Tags: it, engineer, security

What is required You have successfully completed a university degree in business informatics or information technology or have a comparable education You are enthusiastic about IT security and at best you already have professional experience in this area You have the basic technical understanding of corporate networks (e.g. routing, switching, firewall) as well as IPv4 and IPv6 Knowledge of one of the scripting languages, such as B. Perl, Python or Bash (Shell) are desirable You look forward to working in an international team You have a quick grasp and are ready to develop yourself continuously You speak German and English spoken and written What you get We’re a flatly organized team where autonomy and self-management are very valued and well rewarded.

Continue Reading


Tags: training, security

Develop a security-first mindset SNOKE CONNECT provides comprehensive information security training programs for developers, office employees and systems administrators. Keeping your company operating effectively in an ever changing technological landscape requires that your employees at least stay up to date with relevant modern threats, attack vectors and vulnerabilities that often occur within a corporate environment. On-site training Seminars We provide seminars to introduce the fundamental workflows, applications, proof of concept presentations and necessary security protocols that need to be considered when picking applicable software solutions.

Continue Reading

Managed Services Solutions

Tags: services, Outsourcing, monitoring, security

Managed Services Managed Services allow companies to offload specific IT operations to a Managed Service Provider. Offloading the routine infrastructure management to an experienced managed service professional let’s the company focus on running the business, with fewer IT related interruptions. Do You Need To Use Managed Services? The in-house IT budget can sometimes be rather low and managing the day-to-day infrastructure upkeep can be overwhelming. Falling behind with backups and general security practices will cost more than just money during the inevitable recovery phase.

Continue Reading

Security Assessment

Tags: security, cybercrime, network, endpoint, firewall

Information Security Assessment The Information security landscape is ever-evolving and growing in complexity. New technologies for defense and control emerge almost daily and protecting the network alone is no longer enough to keep your data safe. Developing an effective Information Security Strategy requires that data, endpoint and web application security be audited along with the network infrastructure itself. Risk Analysis & Security Assessments Before a successful security strategy can be developed, an assessment of your current environment must take place to identify your security baseline.

Continue Reading

Security Solutions

Tags: security, Splunk, PSAD, Cisco, Sourcefile, Fidelis, OSSEC, Snort

Information Security Solutions Why SNOKE CONNECT? We were ahead of the curve! Security Services and solutions were added to the SNOKE CONNECT portfolio long before other companies saw the need for it. Due to increased malicious activity over the years it became clear to us that security should be top priority in each and every enterprise’s internal procedures. The InfoSec threat landscape is ever-evolving and growing in complexity. New technologies for defense and control emerge almost daily and protecting the network alone is no longer enough to keep your data safe.

Continue Reading

Systems Architecture

Tags: systems, architecture, security

Systems Architecture Security First IT Strategy A future proof and secure IT System Architecture requires careful planning with the help of certified, accredited Systems Architects, network engineers and IT experts. Our vetted vendors collaborate with our in-house consultants to ensure accurate identification and maintenance of security requirements. Our network engineers and information security experts can review your existing infrastructure and compose a streamlined plan to properly secure your network environment. If your business requires maintenance of the existing architecture or implementation of a new apparatus or collection of systems, the SNOKE CONNECT team will produce the road map for building IT platforms that meet current and future business demands.

Continue Reading


Message our team today to receive an initial assessment.



 Düsseldorfer Str. 75
 10719 Berlin, Germany
 +49 30 551 25 188
 +49 30 915 03 934