Blog posts

How a DDoS attack works

DDoS stands for Distributed Denial-of-Service. Distributed denial of service. This is a distributed network attack that exploits capacity limitations. Multiple requests to a resource overload

read more »

Trojan dangers

The Trojan gets its name from the fact that this form of malware disguises itself as a harmless software. From this software, the Trojan then

read more »

This is cybercrime

Cybercrime or Internet crime refers to criminal activities that target computers, computer networks or networked devices. So basically all illegal activities that relate to digital

read more »

2fa in the company

Why two-factor authentication also makes sense for companies User accounts and passwords have had their day when it comes to protecting sensitive data. In payment

read more »
Unternehmen Zwei-Faktor-Authentisierung

Applications with 2fa

How two-factor authentication protects cloud and SaaS services Many companies use cloud and SaaS services to process personal data or sensitive information such as payment

read more »

TOTP one-time passwords

How TOTP one-time passwords secure sensitive corporate data Time-based one-time passwords (TOTP for short) add another component to log-in via user name and password and

read more »