
Two-factor authentication statistics
Two-factor authentication statistics Two-factor authentication has been around for a few years now. However, it took a little while for it to catch on. For
Two-factor authentication statistics Two-factor authentication has been around for a few years now. However, it took a little while for it to catch on. For
Security Awareness in German Companies There are still many people and companies whose security awareness leaves a lot to be desired. Especially when people think
The importance of protection When people talk about data security, the term “protection” rarely comes up. Yet it goes even further than security. Without protection,
Google Authenticator is not free of criticism and omissions. For example, the demand for a function that allows secret seeds to be synchronized for other
Dangerous Authenticator Apps Two-factor authentication is one of the most secure ways to protect one’s accounts from unauthorized access. Hackers and data spies are excluded
Two-factor authentication via SMS Perhaps you have already noticed: Since March 2023, Twitter has made its two-factor authentication available to users only against payment. Of
Privacy in the gym The members of a fitness center trust in the safety concept of the operators. Beginners are introduced to training by the
It is always possible that a security hole opens up somewhere. There is a data breach. Or malware finds its way into the system. The
Here on this blog, we regularly use terms like authentication, authentication, or authorization. These terms are all related, but have certain differences. These differences can
The Internet is full of links. There is no web page that does not have at least one link. Every link leads users to another
Hard disk encryption can protect data on laptops or PCs from hacker attacks. However, there are different types of hard disk encryption. Find out what
DDoS stands for Distributed Denial-of-Service. Distributed denial of service. This is a distributed network attack that exploits capacity limitations. Multiple requests to a resource overload
A data protection breach in the company may have serious consequences. Of course, the goal is to avoid major and minor data breaches. But if
Malware is the generic term that summarizes all types of malicious software. This includes numerous different forms of attackers that can infect a computer system.
Employee data protection plays a major role in companies. At the latest since the General Data Protection Regulation (GDPR), but also already through the Federal
Ransomware is a special form of malware. At least in terms of the target of attackers. This is because the explicit aim is to extort
The General Data Protection Regulation (GDPR) counts health information as information that is particularly worthy of protection. Accordingly, data protection in the doctor’s office is
Online shopping is here to stay. Most purchases are made on the Internet these days. Accordingly, attention must be paid to the security of data.
The Trojan gets its name from the fact that this form of malware disguises itself as a harmless software. From this software, the Trojan then
Password security and where it ends Password security. A topic that concerns us almost every day. After all, all our accounts are protected by passwords.
Cybercrime or Internet crime refers to criminal activities that target computers, computer networks or networked devices. So basically all illegal activities that relate to digital
Passwordless security is still a relatively unknown procedure for many. One of the reasons for this is that it is always drilled into your head
The home office is becoming more and more popular. The times when people only worked at the workplace in the company are long gone. However,
Why two-factor authentication also makes sense for companies User accounts and passwords have had their day when it comes to protecting sensitive data. In payment
How two-factor authentication protects cloud and SaaS services Many companies use cloud and SaaS services to process personal data or sensitive information such as payment
How TOTP one-time passwords secure sensitive corporate data Time-based one-time passwords (TOTP for short) add another component to log-in via user name and password and
How KeePass works as a back-up for a TOTP authenticator A TOTP authenticator that scans QR codes makes the switch to secure 2FA log-ins and