Blog posts

How a DDoS attack works

DDoS stands for Distributed Denial-of-Service. Distributed denial of service. This is a distributed network attack that exploits capacity limitations. Multiple requests to a resource overload

read more »

Trojan dangers

The Trojan gets its name from the fact that this form of malware disguises itself as a harmless software. From this software, the Trojan then

read more »

This is cybercrime

Cybercrime or Internet crime refers to criminal activities that target computers, computer networks or networked devices. So basically all illegal activities that relate to digital

read more »

Data backup

Buy now Back to the overview ! What is a data backup? A data backup can be used to create a backup copy of data.

read more »

What is cybercrime?

Buy now Back to the overview ! What is cybercrime? Cybercrime are criminal offenses that lead to conventional criminal offenses through the use of information

read more »

Biometric authentication

Buy now Back to the overview !   What is biometric authentication? Biometric authentication can provide more security. Instead of the traditional login with user

read more »

2fa in the company

Why two-factor authentication also makes sense for companies User accounts and passwords have had their day when it comes to protecting sensitive data. In payment

read more »
Unternehmen Zwei-Faktor-Authentisierung

Applications with 2fa

How two-factor authentication protects cloud and SaaS services Many companies use cloud and SaaS services to process personal data or sensitive information such as payment

read more »

TOTP one-time passwords

How TOTP one-time passwords secure sensitive corporate data Time-based one-time passwords (TOTP for short) add another component to log-in via user name and password and

read more »
Most popular: